Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r3zg12.msi

Overview

General Information

Sample Name:r3zg12.msi
Analysis ID:878465
MD5:665afc8f8b7972f427fe1bd90d263032
SHA1:cc36e48f383750eb9416961b52ee3100b6e30688
SHA256:d764436caf7114d880f982d208bd9514a433772dcac851f27c510d1597e26edd
Tags:msi
Infos:

Detection

Qbot
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Potentially malicious time measurement code found
Queries the volume information (name, serial number etc) of a device
Yara signature match
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Found inlined nop instructions (likely shell or obfuscated code)
Modifies existing windows services
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Connects to several IPs in different countries
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)
Creates or modifies windows services
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w7x64
  • msiexec.exe (PID: 2364 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\r3zg12.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 2184 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • rundll32.exe (PID: 3244 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 3260 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 3332 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: C9905EA4C326DAB778B9297BA5BD1889)
    • wscript.exe (PID: 3252 cmdline: wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs MD5: 045451FA238A75305CC26AC982472367)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "obama265", "Campaign": "1685436052", "Version": "404.1320", "C2 list": ["103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "94.207.104.225:443", "89.114.140.100:443", "213.64.33.61:2222", "86.176.144.234:2222", "72.134.124.16:443", "47.34.30.133:443", "109.50.149.241:2222", "85.104.105.67:443", "81.111.108.123:443", "86.173.2.12:2222", "188.28.19.84:443", "41.228.224.161:995", "12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.184.103.97:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.1071797162.000000000029D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000007.00000002.1072022431.0000000000E3D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        7.2.rundll32.exe.1c0000.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        7.2.rundll32.exe.1c0000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          7.2.rundll32.exe.2aa328.1.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          7.2.rundll32.exe.2aa328.1.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            7.2.rundll32.exe.2aa328.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xdf71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0x9b97:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000007.00000002.1071797162.000000000029D000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "obama265", "Campaign": "1685436052", "Version": "404.1320", "C2 list": ["103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "94.207.104.225:443", "89.114.140.100:443", "213.64.33.61:2222", "86.176.144.234:2222", "72.134.124.16:443", "47.34.30.133:443", "109.50.149.241:2222", "85.104.105.67:443", "81.111.108.123:443", "86.173.2.12:2222", "188.28.19.84:443", "41.228.224.161:995", "12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.184.103.97:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078"]}
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: netstat -nao
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: runas
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ipconfig /all
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: net localgroup
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Microsoft
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELF_TEST_1
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: p%08x
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Self test FAILED!!!
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Self test OK.
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: /t5
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: whoami /all
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: cmd
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: route print
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .lnk
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: arp -a
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: net share
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: cmd.exe /c set
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Self check
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %u;%u;%u;
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ProfileImagePath
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ProgramData
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Self check ok!
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: powershell.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: qwinsta
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: net view
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Component_08
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Start screenshot
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: appidapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: c:\ProgramData
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Component_07
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: powershell.exe -encodedCommand
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: netstat -nao
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: runas
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ipconfig /all
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SystemRoot
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: cscript.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: C:\INTERNAL\__empty
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_PhysicalMemory
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ALLUSERSPROFILE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: image/jpeg
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: LocalLow
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: displayName
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: shlwapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CommandLine
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: kernel32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SubmitSamplesConsent
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: 1234567890
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wbj.go
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_DiskDrive
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: System32
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Name
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: WRSA.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: c:\\
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SpyNetReporting
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: FALSE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aswhookx.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Packages
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: application/x-shockwave-flash
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: RepUx.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Winsta0
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: avp.exe;kavtray.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: root\SecurityCenter2
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: MsMpEng.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: userenv.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: csc_ui.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: \\.\pipe\
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: pstorec.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: NTUSER.DAT
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: from
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: netapi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: gdi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: setupapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: iphlpapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CrAmTray.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_ComputerSystem
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: user32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: \sf2.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: egui.exe;ekrn.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Software\Microsoft
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %S.%06d
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: bcrypt.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wtsapi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: shell32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: TRUE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_Bios
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: c:\hiberfil.sysss
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: */*
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ByteFence.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: type=0x%04X
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: snxhk_border_mywnd
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ROOT\CIMV2
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: https
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: fshoster32.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: kernelbase.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: regsvr32.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %s\system32\
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_Process
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: rundll32.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: LOCALAPPDATA
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: cmd.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: APPDATA
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: select
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: mcshield.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: advapi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ws2_32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .cfg
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_Product
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: WQL
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wininet.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: LastBootUpTime
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: urlmon.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Create
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_PnPEntity
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Initializing database...
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: winsta0\default
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .dat
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: WBJ_IGNORE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: next
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wpcap.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: image/pjpeg
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: fmon.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: vbs
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aswhooka.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SysWOW64
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: mpr.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: image/gif
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: crypt32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ntdll.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: open
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SystemRoot
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: cscript.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: C:\INTERNAL\__empty
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_PhysicalMemory
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ALLUSERSPROFILE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: image/jpeg
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: LocalLow
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: displayName
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: shlwapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CommandLine
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: kernel32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SubmitSamplesConsent
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: 1234567890
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wbj.go
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_DiskDrive
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: System32
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Name
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: WRSA.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: c:\\
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SpyNetReporting
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: FALSE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aswhookx.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Packages
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: application/x-shockwave-flash
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: RepUx.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Winsta0
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: avp.exe;kavtray.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: root\SecurityCenter2
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: MsMpEng.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: userenv.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: csc_ui.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: \\.\pipe\
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: pstorec.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: NTUSER.DAT
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: from
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: netapi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: gdi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: setupapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: iphlpapi.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CrAmTray.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_ComputerSystem
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: user32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: \sf2.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: egui.exe;ekrn.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Software\Microsoft
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %S.%06d
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: bcrypt.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wtsapi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: shell32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: TRUE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_Bios
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: c:\hiberfil.sysss
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: */*
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ByteFence.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: type=0x%04X
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: snxhk_border_mywnd
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ROOT\CIMV2
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: https
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: fshoster32.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: kernelbase.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: regsvr32.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %s\system32\
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_Process
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: rundll32.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: LOCALAPPDATA
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: cmd.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: APPDATA
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: select
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: mcshield.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: advapi32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ws2_32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .cfg
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_Product
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: WQL
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wininet.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: LastBootUpTime
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: urlmon.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Create
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Win32_PnPEntity
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Initializing database...
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: winsta0\default
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: .dat
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: WBJ_IGNORE
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: next
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: wpcap.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: image/pjpeg
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: fmon.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: vbs
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: aswhooka.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: SysWOW64
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: mpr.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: image/gif
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: crypt32.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: ntdll.dll
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: open
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C0B0 mv_cast5_crypt2,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B0D0 mv_camellia_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013100 mv_encryption_init_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_mallocz,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_calloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C1B0 mv_cast5_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100132D0 mv_encryption_init_info_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10002480 mv_aes_ctr_crypt,mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013480 mv_encryption_init_info_get_side_data,mv_encryption_init_info_alloc,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100084B0 mv_blowfish_crypt,mv_blowfish_crypt_ecb,mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 mv_get_random_seed,BCryptOpenAlgorithmProvider,BCryptGenRandom,BCryptCloseAlgorithmProvider,mvpriv_open,_read,_close,mvpriv_open,_read,_close,clock,clock,mv_sha_init,mv_sha_update,mv_sha_final,mv_log,abort,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10002523 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D590 mv_twofish_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001363B mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000867B mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100136FB mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013860 mv_encryption_init_info_add_side_data,mv_malloc,mv_malloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004A990 mv_tea_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100339C0 mv_rc4_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012A70 mv_encryption_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_calloc,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\System32\msiexec.exeFile opened: z:
            Source: C:\Windows\System32\msiexec.exeFile opened: x:
            Source: C:\Windows\System32\msiexec.exeFile opened: v:
            Source: C:\Windows\System32\msiexec.exeFile opened: t:
            Source: C:\Windows\System32\msiexec.exeFile opened: r:
            Source: C:\Windows\System32\msiexec.exeFile opened: p:
            Source: C:\Windows\System32\msiexec.exeFile opened: n:
            Source: C:\Windows\System32\msiexec.exeFile opened: l:
            Source: C:\Windows\System32\msiexec.exeFile opened: j:
            Source: C:\Windows\System32\msiexec.exeFile opened: h:
            Source: C:\Windows\System32\msiexec.exeFile opened: f:
            Source: C:\Windows\System32\msiexec.exeFile opened: b:
            Source: C:\Windows\System32\msiexec.exeFile opened: y:
            Source: C:\Windows\System32\msiexec.exeFile opened: w:
            Source: C:\Windows\System32\msiexec.exeFile opened: u:
            Source: C:\Windows\System32\msiexec.exeFile opened: s:
            Source: C:\Windows\System32\msiexec.exeFile opened: q:
            Source: C:\Windows\System32\msiexec.exeFile opened: o:
            Source: C:\Windows\System32\msiexec.exeFile opened: m:
            Source: C:\Windows\System32\msiexec.exeFile opened: k:
            Source: C:\Windows\System32\msiexec.exeFile opened: i:
            Source: C:\Windows\System32\msiexec.exeFile opened: g:
            Source: C:\Windows\System32\msiexec.exeFile opened: e:
            Source: C:\Windows\SysWOW64\wermgr.exeFile opened: c:
            Source: C:\Windows\System32\msiexec.exeFile opened: a:
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then push ebx
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]

            Networking

            barindex
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 78.160.146.127:443
            Source: Malware configuration extractorIPs: 84.35.26.14:995
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 124.149.143.189:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 186.64.67.30:443
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 94.207.104.225:443
            Source: Malware configuration extractorIPs: 89.114.140.100:443
            Source: Malware configuration extractorIPs: 213.64.33.61:2222
            Source: Malware configuration extractorIPs: 86.176.144.234:2222
            Source: Malware configuration extractorIPs: 72.134.124.16:443
            Source: Malware configuration extractorIPs: 47.34.30.133:443
            Source: Malware configuration extractorIPs: 109.50.149.241:2222
            Source: Malware configuration extractorIPs: 85.104.105.67:443
            Source: Malware configuration extractorIPs: 81.111.108.123:443
            Source: Malware configuration extractorIPs: 86.173.2.12:2222
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 41.228.224.161:995
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 178.175.187.254:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 205.237.67.69:995
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 193.253.100.236:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 102.159.188.125:443
            Source: Malware configuration extractorIPs: 71.38.155.217:443
            Source: Malware configuration extractorIPs: 58.186.75.42:443
            Source: Malware configuration extractorIPs: 76.178.148.107:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 51.14.29.227:2222
            Source: Malware configuration extractorIPs: 59.28.84.65:443
            Source: Malware configuration extractorIPs: 173.88.135.179:443
            Source: Malware configuration extractorIPs: 103.144.201.56:2078
            Source: Malware configuration extractorIPs: 96.87.28.170:2222
            Source: Malware configuration extractorIPs: 105.184.103.97:995
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 151.62.238.176:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 122.186.210.254:443
            Source: Malware configuration extractorIPs: 82.125.44.236:2222
            Source: Malware configuration extractorIPs: 84.108.200.161:443
            Source: Malware configuration extractorIPs: 76.16.49.134:443
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 76.170.252.153:995
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 78.92.133.215:443
            Source: Malware configuration extractorIPs: 50.68.204.71:993
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 98.145.23.67:443
            Source: Malware configuration extractorIPs: 85.57.212.13:3389
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 69.242.31.249:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 75.143.236.149:443
            Source: Malware configuration extractorIPs: 14.192.241.76:995
            Source: Malware configuration extractorIPs: 86.195.14.72:2222
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 220.240.164.182:443
            Source: Malware configuration extractorIPs: 73.29.92.128:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 76.86.31.59:443
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 68.203.69.96:443
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 122.184.143.86:443
            Source: Malware configuration extractorIPs: 92.186.69.229:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 89.129.109.27:2222
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 151.65.167.77:443
            Source: Malware configuration extractorIPs: 86.132.236.117:443
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 89.36.206.69:995
            Source: Malware configuration extractorIPs: 96.56.197.26:2083
            Source: Malware configuration extractorIPs: 78.18.105.11:443
            Source: Malware configuration extractorIPs: 82.127.153.75:2222
            Source: Malware configuration extractorIPs: 90.78.147.141:2222
            Source: Malware configuration extractorIPs: 82.131.141.209:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 80.12.88.148:2222
            Source: Malware configuration extractorIPs: 69.133.162.35:443
            Source: Malware configuration extractorIPs: 172.115.17.50:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 24.198.114.130:995
            Source: Malware configuration extractorIPs: 50.68.204.71:443
            Source: Malware configuration extractorIPs: 69.119.123.159:2222
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 70.112.206.5:443
            Source: Malware configuration extractorIPs: 198.2.51.242:993
            Source: Malware configuration extractorIPs: 2.36.64.159:2078
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 147.219.4.194:443
            Source: Malware configuration extractorIPs: 116.74.164.81:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: unknownNetwork traffic detected: IP country count 30
            Source: rundll32.exe, rundll32.exe, 00000007.00000002.1072236585.00000000100AB000.00000002.00000001.01000000.00000006.sdmp, main.dll.2.drString found in binary or memory: https://streams.videolan.org/upload/
            Source: 7.2.rundll32.exe.1c0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 7.2.rundll32.exe.2aa328.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 7.2.rundll32.exe.2aa328.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\725f13.ipiJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\725f12.msiJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10079010
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D060
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10081091
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B0D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007A0F3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10098118
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002F110
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008144
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A415E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A615C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10088194
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100101D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001021B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002B270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004B2B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100752F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100842F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10086310
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007D347
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10021340
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002C390
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D3B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004E3E0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007C415
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002C428
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013480
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D4D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100774E2
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004C500
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007D511
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10025550
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10082550
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10028590
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D590
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100105C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D5C1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007C5E1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008A640
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000164B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A566C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10080660
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10027690
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10066691
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A46FC
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100556F8
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10024700
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10087748
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10079740
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10030750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10087750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000E760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10021760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010778
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A57A5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100767C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100857F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B830
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10020830
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A5843
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032890
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100218A0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007F900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D910
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010980
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004A990
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001099C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100499A0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C9F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FA00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004BA00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000AA10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007A50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007CAB7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001EAB0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EAC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FAE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FAF7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10081AF0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10020B00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10078B10
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 77620000 page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 77740000 page execute and read and write
            Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\r3zg12.msi"
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPluginJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\~DFCE21E83529306783.TMPJump to behavior
            Source: classification engineClassification label: mal92.troj.evad.winMSI@10/11@0/100
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{7DD17790-B8AD-4410-A157-17ED3BEC62EE}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7DD17790-B8AD-4410-A157-17ED3BEC62EE}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{4F34BA3E-DAF6-44F5-9C34-3488F9C4B308}
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008C51C push es; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008C5CA push es; ret
            Source: main.dll.2.drStatic PE information: real checksum: 0xe9e0f should be: 0xee24d
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
            Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3332 base: BD2AFF value: E9 B4 E8 55 FF
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exe TID: 2388Thread sleep time: -180000s >= -30000s
            Source: C:\Windows\System32\msiexec.exe TID: 3288Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\msiexec.exe TID: 2572Thread sleep time: -360000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 3264Thread sleep count: 109 > 30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.0 %
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 Start: 100327F5 End: 1003263E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_3_00142297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002A9E9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 80000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 130000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: BD2AFF
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 130000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 80000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 130000 value starts with: 4D5A
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008B030 cpuid
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008F660 GetTimeZoneInformation,GetModuleHandleA,GetProcAddress,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.rundll32.exe.1c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.2aa328.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.2aa328.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.1071797162.000000000029D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.1072022431.0000000000E3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.rundll32.exe.1c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.2aa328.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.2aa328.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.1071797162.000000000029D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.1072022431.0000000000E3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            11
            Scripting
            2
            Windows Service
            2
            Windows Service
            11
            Masquerading
            1
            Credential API Hooking
            1
            System Time Discovery
            1
            Replication Through Removable Media
            1
            Credential API Hooking
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts311
            Process Injection
            1
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
            Scripting
            LSA Secrets11
            Peripheral Device Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Obfuscated Files or Information
            Cached Domain Credentials23
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Rundll32
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            File Deletion
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878465 Sample: r3zg12.msi Startdate: 30/05/2023 Architecture: WINDOWS Score: 92 25 2.36.64.159 VODAFONE-IT-ASNIT Italy 2->25 27 85.57.212.13 UNI2-ASES Spain 2->27 29 98 other IPs or domains 2->29 39 Found malware configuration 2->39 41 Yara detected Qbot 2->41 43 Sample uses string decryption to hide its real strings 2->43 45 C2 URLs / IPs found in malware configuration 2->45 9 msiexec.exe 81 25 2->9         started        12 msiexec.exe 3 2->12         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\main.dll, PE32 9->23 dropped 14 rundll32.exe 9->14         started        16 wscript.exe 9->16         started        process6 process7 18 rundll32.exe 14->18         started        signatures8 31 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 18->31 33 Writes to foreign memory regions 18->33 35 Allocates memory in foreign processes 18->35 37 2 other signatures 18->37 21 wermgr.exe 8 1 18->21         started        process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            r3zg12.msi0%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://streams.videolan.org/upload/rundll32.exe, rundll32.exe, 00000007.00000002.1072236585.00000000100AB000.00000002.00000001.01000000.00000006.sdmp, main.dll.2.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              2.82.8.80
              unknownPortugal
              3243MEO-RESIDENCIALPTtrue
              70.160.67.203
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              75.143.236.149
              unknownUnited States
              20115CHARTER-20115UStrue
              83.110.223.61
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              86.195.14.72
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              84.215.202.8
              unknownNorway
              41164GET-NOGETNorwayNOtrue
              184.182.66.109
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              105.184.103.97
              unknownSouth Africa
              37457Telkom-InternetZAtrue
              92.186.69.229
              unknownFrance
              12479UNI2-ASEStrue
              174.4.89.3
              unknownCanada
              6327SHAWCAtrue
              161.142.103.187
              unknownMalaysia
              9930TTNET-MYTIMEdotComBerhadMYtrue
              114.143.176.236
              unknownIndia
              17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
              14.192.241.76
              unknownMalaysia
              9534MAXIS-AS1-APBinariangBerhadMYtrue
              173.88.135.179
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              84.108.200.161
              unknownIsrael
              8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILtrue
              47.34.30.133
              unknownUnited States
              20115CHARTER-20115UStrue
              183.87.163.165
              unknownIndia
              132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
              124.149.143.189
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              184.181.75.148
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              84.35.26.14
              unknownNetherlands
              21221INFOPACT-ASTheNetherlandsNLtrue
              73.29.92.128
              unknownUnited States
              7922COMCAST-7922UStrue
              68.203.69.96
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              82.131.141.209
              unknownHungary
              20845DIGICABLEHUtrue
              64.121.161.102
              unknownUnited States
              6079RCN-ASUStrue
              178.175.187.254
              unknownMoldova Republic of
              43289TRABIAMDtrue
              96.56.197.26
              unknownUnited States
              6128CABLE-NET-1UStrue
              186.64.67.30
              unknownArgentina
              27953NODOSUDSAARtrue
              188.28.19.84
              unknownUnited Kingdom
              206067H3GUKGBtrue
              125.99.76.102
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              81.101.185.146
              unknownUnited Kingdom
              5089NTLGBtrue
              86.176.144.234
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              59.28.84.65
              unknownKorea Republic of
              4766KIXS-AS-KRKoreaTelecomKRtrue
              76.86.31.59
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              147.147.30.126
              unknownUnited Kingdom
              6871PLUSNETUKInternetServiceProviderGBtrue
              96.87.28.170
              unknownUnited States
              7922COMCAST-7922UStrue
              75.109.111.89
              unknownUnited States
              19108SUDDENLINK-COMMUNICATIONSUStrue
              78.92.133.215
              unknownHungary
              5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUtrue
              124.122.47.148
              unknownThailand
              17552TRUE-AS-APTrueInternetCoLtdTHtrue
              88.126.94.4
              unknownFrance
              12322PROXADFRtrue
              51.14.29.227
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              85.57.212.13
              unknownSpain
              12479UNI2-ASEStrue
              47.205.25.170
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              95.45.50.93
              unknownIreland
              5466EIRCOMInternetHouseIEtrue
              80.12.88.148
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              81.111.108.123
              unknownUnited Kingdom
              5089NTLGBtrue
              69.133.162.35
              unknownUnited States
              11426TWC-11426-CAROLINASUStrue
              86.132.236.117
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              151.62.238.176
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              70.112.206.5
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              41.228.224.161
              unknownTunisia
              37693TUNISIANATNtrue
              205.237.67.69
              unknownCanada
              11290CC-3272CAtrue
              102.159.188.125
              unknownTunisia
              37705TOPNETTNtrue
              151.65.167.77
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              76.178.148.107
              unknownUnited States
              10838OCEANIC-INTERNET-RRUStrue
              89.36.206.69
              unknownItaly
              48544TECNOADSL-ASITtrue
              69.242.31.249
              unknownUnited States
              7922COMCAST-7922UStrue
              85.104.105.67
              unknownTurkey
              9121TTNETTRtrue
              94.207.104.225
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              193.253.100.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              76.16.49.134
              unknownUnited States
              7922COMCAST-7922UStrue
              201.244.108.183
              unknownColombia
              19429ETB-ColombiaCOtrue
              103.42.86.42
              unknownIndia
              133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
              78.18.105.11
              unknownIreland
              2110AS-BTIREBTIrelandwaspreviouslyknownasEsatNetEUnettrue
              80.6.50.34
              unknownUnited Kingdom
              5089NTLGBtrue
              103.144.201.56
              unknownunknown
              139762MSSOLUTION-AS-APSolutionBDtrue
              27.0.48.233
              unknownIndia
              132573SAINGN-AS-INSAINGNNetworkServicesINtrue
              70.28.50.223
              unknownCanada
              577BACOMCAtrue
              98.145.23.67
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              82.125.44.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              81.229.117.95
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              89.129.109.27
              unknownSpain
              12479UNI2-ASEStrue
              122.186.210.254
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              79.77.142.22
              unknownUnited Kingdom
              9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
              90.78.147.141
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              122.184.143.86
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              186.75.95.6
              unknownPanama
              11556CableWirelessPanamaPAtrue
              50.68.186.195
              unknownCanada
              6327SHAWCAtrue
              12.172.173.82
              unknownUnited States
              2386INS-ASUStrue
              213.64.33.61
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              79.168.224.165
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              176.142.207.63
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              86.173.2.12
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              92.154.17.149
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              78.160.146.127
              unknownTurkey
              9121TTNETTRtrue
              58.186.75.42
              unknownViet Nam
              18403FPT-AS-APTheCorporationforFinancingPromotingTechnolotrue
              223.166.13.95
              unknownChina
              17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
              65.95.141.84
              unknownCanada
              577BACOMCAtrue
              50.68.204.71
              unknownCanada
              6327SHAWCAtrue
              71.38.155.217
              unknownUnited States
              209CENTURYLINK-US-LEGACY-QWESTUStrue
              220.240.164.182
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              103.123.223.133
              unknownIndia
              138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
              24.198.114.130
              unknownUnited States
              11351TWC-11351-NORTHEASTUStrue
              2.36.64.159
              unknownItaly
              30722VODAFONE-IT-ASNITtrue
              198.2.51.242
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              92.9.45.20
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              113.11.92.30
              unknownBangladesh
              7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
              109.50.149.241
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              69.119.123.159
              unknownUnited States
              6128CABLE-NET-1UStrue
              172.115.17.50
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              147.219.4.194
              unknownUnited States
              1498DNIC-ASBLK-01498-01499UStrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:878465
              Start date and time:2023-05-30 17:55:55 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 7s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:r3zg12.msi
              Detection:MAL
              Classification:mal92.troj.evad.winMSI@10/11@0/100
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 81%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, VSSVC.exe, svchost.exe
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtFsControlFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
              • VT rate limit hit for: r3zg12.msi
              TimeTypeDescription
              17:57:02API Interceptor1844x Sleep call for process: msiexec.exe modified
              17:57:33API Interceptor23x Sleep call for process: rundll32.exe modified
              17:57:33API Interceptor247x Sleep call for process: wscript.exe modified
              17:57:37API Interceptor179x Sleep call for process: wermgr.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):8650
              Entropy (8bit):5.53533566252833
              Encrypted:false
              SSDEEP:96:ke6Ke2crqUNPw9CsAqWUNPw9C6jvogU/AqmHVP0cdxnG3ciuHsjfLwCUVp3B2BJB:kqeH9wgS9wgvcnY3UVpi
              MD5:C3EE277FD29FA58F348CE837640A6248
              SHA1:9A776BC167BD6816A2F16488D1CA279144076CE2
              SHA-256:5C577159B0F56A406D538702FC2E0E56F66E43CDF0E39C4BFB5F4681317B4A45
              SHA-512:51EE05D5D9CD3A78ACB82F44E746B33F0DD0E2E93AAF77AC0FA95C594D65A8E270F97A703FEE8236BD4C0F660C1B80364D14A0AF117D17C60FC4AB676B9E56F2
              Malicious:false
              Preview:...@IXOS.@.....@..V.@.....@.....@.....@.....@.....@......&.{BADFC54D-C40E-45B2-8055-C154444F1F83}'.Adobe Acrobat PDF Browser Plugin 4.8.25..r3zg12.msi.@.....@.....@.....@........&.{880CDD59-0C2C-49AC-BA45-82BB01CD8BD1}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}&.{BADFC54D-C40E-45B2-8055-C154444F1F83}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\....B.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll....D.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs....WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....%.Software\AdobeAcrobatPDFBrowserPlugin...@....(.&...AdobeAcrobatPDFBro
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):952832
              Entropy (8bit):6.765768694509863
              Encrypted:false
              SSDEEP:24576:UkgLxg2eMP8EN8Vo7zgDQ9uo4iZSBi/u3wXqx9jKVM5qx0YJ:x/jDQMo49wpq
              MD5:5E107608DD00957472DB2C1FCC77599D
              SHA1:D9BFA3E88CA0F86182CB84D4008AC6B346B755E9
              SHA-256:185737016A01E84BF88523A4681723B4F2D0D22520E77B76740CC3C6323E38BF
              SHA-512:22DFAE946F939EB361CEF49ED6EB953097A23A31BE0E97E6B7D31D3B2152C2371DA44E9E6BDD369E7145856BA75369FEA4DEAB18FA035E2A2CBD1E7D4E23CAF4
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..d...........#...8...................................................... ...........@... .........................hC......<............................ ...?..........................$J.......................................................text...4...........................`.0`.data...............................@.0..rdata..|...........................@.0@.bss....D....p.......>................0..edata..hC.......D...>..............@.0@.idata..<...........................@.0..CRT....0...........................@.0..tls................................@.0..rsrc...b...........................@.0..reloc...?.......@...J..............@.0B................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):132
              Entropy (8bit):4.599233980549996
              Encrypted:false
              SSDEEP:3:LwBxFkvH4dGmMKLVKRLGPz4VAFkvH4dGmMKLVKRLGH:cHFkvYdlZKRLi7FkvYdlZKRL4
              MD5:0D4C9F15CE74465C59AE36A27F98C817
              SHA1:9CCE8EEFA4D3D9C5E161C5DBB860CFE1489C6B1A
              SHA-256:D24E3399060B51F3A1C9D41A67DE2601888A35C99DA8DB70070D757BB3F1913A
              SHA-512:9BED0EAFC2CF2A2360850CA1070FFB04AC14F04C78379485998A93F45012B5C11CC7F6F68129F65B8B5F90437CB965908C6A1BB9D83A56B068D6BDE1D5FDAD1F
              Malicious:false
              Preview:MsgBox "Adobe Acrobat PDF Browser Plugin installation error 0x00000328", 16, "Adobe Acrobat PDF Browser Plugin installation error"..
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):0.06947604271114201
              Encrypted:false
              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOGljlnucCRjQVky6lS:2F0i8n0itFzDHFZRRS
              MD5:D429E7962EAB07E07C545C296E8B0F35
              SHA1:9AC331509B3E15434194BAECFA89488D380435FC
              SHA-256:14064733FE0126C92AE648CE46DD3AF9820F19CA4F87B6FFCD9134C3A4FD19EE
              SHA-512:BF7726A85BAFFE69B531188332BBE26F1ADFF215BAB9CB3FFA26B2FC1A6D6D337328E1670526C5040AF4C6F39E838456DE85834EBB97A704A641A76132970259
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):69632
              Entropy (8bit):0.12150165085044722
              Encrypted:false
              SSDEEP:24:jIAWMQQt7E818lOdWmDqqrb9ipVIdWmDqqrb9ipV7VIwGklrkgV+rRH:cAWMNC818lEOMSoOMS5RrV
              MD5:152881F8DC204D99AEBA2705A3782FCB
              SHA1:660CC21C9CAC248ABAEDB2BA0C5584BCA6336755
              SHA-256:9BF23AB3B18670ADA93F47C692FADA5B6652AC14C1887F6D78932E237B141BE6
              SHA-512:DC0C2C8B8A2BAE9227538E8AECC236B9ED99E5BFFDC2E848B13303ECEE8215E20ECCE5764193847093708A90F8860AA96A5BD302228E83194706612C054D54B9
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {880CDD59-0C2C-49AC-BA45-82BB01CD8BD1}, Create Time/Date: Tue May 30 14:29:16 2023, Last Saved Time/Date: Tue May 30 14:29:16 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):507904
              Entropy (8bit):7.919635795804226
              Encrypted:false
              SSDEEP:12288:vn+NgINNEcfjVRMigNFoILI8KviLjvhAN+S0w3:vnX9gjVRMDqH8fL1+35
              MD5:665AFC8F8B7972F427FE1BD90D263032
              SHA1:CC36E48F383750EB9416961B52EE3100B6E30688
              SHA-256:D764436CAF7114D880F982D208BD9514A433772DCAC851F27C510D1597E26EDD
              SHA-512:D30110DC240790A1F0C15DF31069D361F80DF327C258DD3305E70EB9EE3814C285AB6290E88E4072B375F7DAC3D183D22ABA29CB94FDD7DB937C4399C18AD37E
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.5290834806885116
              Encrypted:false
              SSDEEP:24:JoFC/lym6cpmUHCAjluSwPc+rVdWmDqqrb9ipV7VIwGklrkgsdWmDqqrb9ipVi8d:K0+cDHBluIEOMS5RrmOMSI818lnAWMN
              MD5:F79FA452955160DEA66B355C79633348
              SHA1:DF8591F44D592B2DED4CC19C50944D0C9C7A1EA2
              SHA-256:98D499E3EE487BC8A41B4339F34E48ADF45D504D743F381DBA3979CF4B63BA46
              SHA-512:663F75D95F9B059DDAC7AFFA125891EF193463A15B631B2E587E5DCF10D29EB770542080317BB493C75972C197B291A271EEB7E3CD8DE720135D24BB10D28A93
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {880CDD59-0C2C-49AC-BA45-82BB01CD8BD1}, Create Time/Date: Tue May 30 14:29:16 2023, Last Saved Time/Date: Tue May 30 14:29:16 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):507904
              Entropy (8bit):7.919635795804226
              Encrypted:false
              SSDEEP:12288:vn+NgINNEcfjVRMigNFoILI8KviLjvhAN+S0w3:vnX9gjVRMDqH8fL1+35
              MD5:665AFC8F8B7972F427FE1BD90D263032
              SHA1:CC36E48F383750EB9416961B52EE3100B6E30688
              SHA-256:D764436CAF7114D880F982D208BD9514A433772DCAC851F27C510D1597E26EDD
              SHA-512:D30110DC240790A1F0C15DF31069D361F80DF327C258DD3305E70EB9EE3814C285AB6290E88E4072B375F7DAC3D183D22ABA29CB94FDD7DB937C4399C18AD37E
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):2138
              Entropy (8bit):5.574222322102891
              Encrypted:false
              SSDEEP:48:VT5zj3JwCP3NDufgzYjRBoD8SY1eU/Fn9nhaEVlt+Xtu2:V/rYjrAueGnaEPi
              MD5:D677AFC93165EECE0A0BF927F0813BC0
              SHA1:374BAA5C81F013F5A665D23376BE78FD27A97A26
              SHA-256:9C430E95C05E227034C66BBFE82596D108E698689CE7146E1A64139674C29607
              SHA-512:27A88CACD02BB8AE072098411E8F52C22FC91FF0B6B2BECE3FED8910E531BF16BCFF408D63E062BA400D548893C2DBFEBAAA1B894248E149640047D535AC43B8
              Malicious:false
              Preview:...@IXOS.@.....@..V.@.....@.....@.....@.....@.....@......&.{BADFC54D-C40E-45B2-8055-C154444F1F83}'.Adobe Acrobat PDF Browser Plugin 4.8.25..r3zg12.msi.@.....@.....@.....@........&.{880CDD59-0C2C-49AC-BA45-82BB01CD8BD1}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}F.01:\Software\AdobeAcrobatPDFBrowserPlugin\AdobeAcrobatPDFBrowserPlugin.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@......:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\..).1\xssanpen\|AdobeAcrobatPDFBrowserPlugin\......Please insert the disk: ..media3.cab.@.....@......C:\Windows\Installer\725f12.msi.........@........main.dll..dll_main..main.dll.@.....@.....@.......@...
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.1629135735710199
              Encrypted:false
              SSDEEP:12:JSbX72FjRAGiLIlHVRpth/7777777777777777777777777vDHFZRwpSl0i8Q:J3QI5p0F
              MD5:43D53436CE3F850800B0ACC9CDAA39B9
              SHA1:E7C780CC0555D1E5A10AF2B0736C1985D2294758
              SHA-256:913C3DA22ABBA627ECFB121EF494CDC045D0BD6659BE7C8F2FD2328A45ED879C
              SHA-512:6D41E88A82F3515194869BCC7D66EE28E6A2FFF9B3861A5CC10D5A60F8175E61C20C34AB9C00F7978053C21803C6337FA6FCD156F4A4FB69183ED21551916138
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {880CDD59-0C2C-49AC-BA45-82BB01CD8BD1}, Create Time/Date: Tue May 30 14:29:16 2023, Last Saved Time/Date: Tue May 30 14:29:16 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Entropy (8bit):7.919635795804226
              TrID:
              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
              File name:r3zg12.msi
              File size:507904
              MD5:665afc8f8b7972f427fe1bd90d263032
              SHA1:cc36e48f383750eb9416961b52ee3100b6e30688
              SHA256:d764436caf7114d880f982d208bd9514a433772dcac851f27c510d1597e26edd
              SHA512:d30110dc240790a1f0c15df31069d361f80df327c258dd3305e70eb9ee3814c285ab6290e88e4072b375f7dac3d183d22aba29cb94fdd7db937c4399c18ad37e
              SSDEEP:12288:vn+NgINNEcfjVRMigNFoILI8KviLjvhAN+S0w3:vnX9gjVRMDqH8fL1+35
              TLSH:21B42359660A6371C4C826B2E73E77CFAAA27C5507038433C33B72DE1D775B81A663A1
              File Content Preview:........................>......................................................................................................................................................................................................................................
              Icon Hash:2d2e3797b32b2b99
              No network behavior found

              Click to jump to process

              Target ID:1
              Start time:17:57:02
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\r3zg12.msi"
              Imagebase:0xff920000
              File size:128512 bytes
              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:2
              Start time:17:57:02
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\msiexec.exe /V
              Imagebase:0xff920000
              File size:128512 bytes
              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:5
              Start time:17:57:33
              Start date:30/05/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0xff470000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:17:57:33
              Start date:30/05/2023
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
              Imagebase:0xff120000
              File size:168960 bytes
              MD5 hash:045451FA238A75305CC26AC982472367
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:17:57:33
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0xf20000
              File size:44544 bytes
              MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.1071797162.000000000029D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.1072022431.0000000000E3D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:high

              Target ID:8
              Start time:17:57:36
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\wermgr.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\wermgr.exe
              Imagebase:0xbd0000
              File size:53760 bytes
              MD5 hash:C9905EA4C326DAB778B9297BA5BD1889
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              No disassembly