Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
15dasx.msi

Overview

General Information

Sample Name:15dasx.msi
Analysis ID:878630
MD5:ab8ef3423324168d06b2d122f75ca130
SHA1:a7e273ddd7cdf303e366cba16abfd4c3966f2cf6
SHA256:4e70da2d2efc833eb5c450c9f82aaa7d433e31e39dc4ec36ca3c5ddde0f4dc00
Tags:msi
Infos:

Detection

Qbot
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Potentially malicious time measurement code found
Queries the volume information (name, serial number etc) of a device
Yara signature match
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Modifies existing windows services
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Connects to several IPs in different countries
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)
Creates or modifies windows services
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w7x64
  • msiexec.exe (PID: 2076 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\15dasx.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 1188 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • rundll32.exe (PID: 2196 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2120 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 2620 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: C9905EA4C326DAB778B9297BA5BD1889)
    • wscript.exe (PID: 1212 cmdline: wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs MD5: 045451FA238A75305CC26AC982472367)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "BB30", "Campaign": "1685433861", "Version": "404.1320", "C2 list": ["12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.186.128.181:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078", "12.172.173.82:995", "77.86.98.236:443", "104.35.24.154:443", "213.64.33.61:2222", "47.149.134.231:443", "72.134.124.16:443", "47.34.30.133:443", "103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "188.28.19.84:443", "174.58.146.57:443", "94.207.104.225:443", "86.97.55.89:2222", "69.123.4.221:2222"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.1050273322.00000000023DD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000007.00000002.1050043697.000000000037D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        7.2.rundll32.exe.38a328.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xdf71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0x9b97:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        7.2.rundll32.exe.38a328.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          7.2.rundll32.exe.1b0000.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          7.2.rundll32.exe.1b0000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            7.2.rundll32.exe.38a328.1.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000007.00000002.1050043697.000000000037D000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685433861", "Version": "404.1320", "C2 list": ["12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.186.128.181:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078", "12.172.173.82:995", "77.86.98.236:443", "104.35.24.154:443", "213.64.33.61:2222", "47.149.134.231:443", "72.134.124.16:443", "47.34.30.133:443", "103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "188.28.19.84:443", "174.58.146.57:443", "94.207.104.225:443", "86.97.55.89:2222", "69.123.4.221:2222"]}
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: netstat -nao
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: runas
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ipconfig /all
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: net localgroup
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Microsoft
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELF_TEST_1
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: p%08x
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Self test FAILED!!!
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Self test OK.
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: /t5
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: whoami /all
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: cmd
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: route print
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .lnk
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: arp -a
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: net share
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: cmd.exe /c set
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Self check
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %u;%u;%u;
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ProfileImagePath
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ProgramData
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Self check ok!
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: powershell.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: qwinsta
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: net view
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Component_08
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Start screenshot
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: appidapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: c:\ProgramData
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Component_07
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: powershell.exe -encodedCommand
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: netstat -nao
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: runas
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ipconfig /all
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SystemRoot
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: cscript.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: C:\INTERNAL\__empty
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_PhysicalMemory
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ALLUSERSPROFILE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: image/jpeg
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: LocalLow
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: displayName
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: shlwapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CommandLine
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: kernel32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SubmitSamplesConsent
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: 1234567890
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wbj.go
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_DiskDrive
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: System32
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Name
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: WRSA.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: c:\\
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SpyNetReporting
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: FALSE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aswhookx.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Packages
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: application/x-shockwave-flash
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: RepUx.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Winsta0
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: avp.exe;kavtray.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: root\SecurityCenter2
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: MsMpEng.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: userenv.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: csc_ui.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: \\.\pipe\
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: pstorec.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: NTUSER.DAT
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: from
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: netapi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: gdi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: setupapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: iphlpapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CrAmTray.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_ComputerSystem
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: user32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: \sf2.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: egui.exe;ekrn.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Software\Microsoft
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %S.%06d
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: bcrypt.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wtsapi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: shell32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: TRUE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_Bios
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: c:\hiberfil.sysss
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: */*
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ByteFence.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: type=0x%04X
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: snxhk_border_mywnd
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ROOT\CIMV2
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: https
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: fshoster32.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: kernelbase.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: regsvr32.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %s\system32\
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_Process
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: rundll32.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: LOCALAPPDATA
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: cmd.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: APPDATA
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: select
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: mcshield.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: advapi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ws2_32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .cfg
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_Product
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: WQL
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wininet.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: LastBootUpTime
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: urlmon.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Create
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_PnPEntity
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Initializing database...
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: winsta0\default
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .dat
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: WBJ_IGNORE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: next
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wpcap.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: image/pjpeg
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: fmon.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: vbs
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aswhooka.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SysWOW64
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: mpr.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: image/gif
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: crypt32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ntdll.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: open
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SystemRoot
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: cscript.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: C:\INTERNAL\__empty
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_PhysicalMemory
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ALLUSERSPROFILE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: image/jpeg
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: LocalLow
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: displayName
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: shlwapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CommandLine
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: kernel32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SubmitSamplesConsent
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: 1234567890
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wbj.go
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_DiskDrive
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: System32
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Name
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: WRSA.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: c:\\
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SpyNetReporting
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: FALSE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aswhookx.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Packages
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: application/x-shockwave-flash
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: RepUx.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Winsta0
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: avp.exe;kavtray.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: root\SecurityCenter2
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: MsMpEng.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: userenv.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: csc_ui.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: \\.\pipe\
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: pstorec.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: NTUSER.DAT
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: from
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: netapi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: gdi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: setupapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: iphlpapi.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CrAmTray.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_ComputerSystem
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: user32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: \sf2.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: egui.exe;ekrn.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Software\Microsoft
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %S.%06d
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: bcrypt.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wtsapi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: shell32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: TRUE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_Bios
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: c:\hiberfil.sysss
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: */*
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ByteFence.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: type=0x%04X
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: snxhk_border_mywnd
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ROOT\CIMV2
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: https
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: fshoster32.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: kernelbase.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: regsvr32.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %s\system32\
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_Process
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: rundll32.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: LOCALAPPDATA
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: cmd.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: APPDATA
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: select
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: mcshield.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: advapi32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ws2_32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .cfg
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_Product
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: WQL
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wininet.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: LastBootUpTime
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: urlmon.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Create
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Win32_PnPEntity
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Initializing database...
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: winsta0\default
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: .dat
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: WBJ_IGNORE
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: next
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: wpcap.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: image/pjpeg
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: fmon.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: vbs
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: aswhooka.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: SysWOW64
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: mpr.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: image/gif
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: crypt32.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: ntdll.dll
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: open
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 7.2.rundll32.exe.1b0000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10035030 mv_get_random_seed,BCryptOpenAlgorithmProvider,BCryptGenRandom,BCryptCloseAlgorithmProvider,mvpriv_open,_read,_close,mvpriv_open,_read,_close,clock,clock,mv_sha_init,mv_sha_update,mv_sha_final,mv_log,abort,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C0B0 mv_cast5_crypt2,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100500B0 mv_twofish_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B0D0 mv_camellia_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013100 mv_encryption_init_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_mallocz,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_calloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C1B0 mv_cast5_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100132D0 mv_encryption_init_info_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10002480 mv_aes_ctr_crypt,mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013480 mv_encryption_init_info_get_side_data,mv_encryption_init_info_alloc,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100084B0 mv_blowfish_crypt,mv_blowfish_crypt_ecb,mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D4B0 mv_tea_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100364E0 mv_rc4_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10002523 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001363B mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000867B mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100136FB mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100907D0 mv_xtea_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013860 mv_encryption_init_info_add_side_data,mv_malloc,mv_malloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10090910 mv_xtea_le_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012A70 mv_encryption_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_calloc,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012B40 mv_encryption_info_clone,mv_encryption_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001BF0 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012CF0 mv_encryption_info_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012D40 mv_encryption_info_get_side_data,mv_encryption_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007DC0 mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010E40 mv_des_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012F30 mv_encryption_info_add_side_data,mv_malloc,
            Source: C:\Windows\System32\msiexec.exeFile opened: z:
            Source: C:\Windows\System32\msiexec.exeFile opened: x:
            Source: C:\Windows\System32\msiexec.exeFile opened: v:
            Source: C:\Windows\System32\msiexec.exeFile opened: t:
            Source: C:\Windows\System32\msiexec.exeFile opened: r:
            Source: C:\Windows\System32\msiexec.exeFile opened: p:
            Source: C:\Windows\System32\msiexec.exeFile opened: n:
            Source: C:\Windows\System32\msiexec.exeFile opened: l:
            Source: C:\Windows\System32\msiexec.exeFile opened: j:
            Source: C:\Windows\System32\msiexec.exeFile opened: h:
            Source: C:\Windows\System32\msiexec.exeFile opened: f:
            Source: C:\Windows\System32\msiexec.exeFile opened: b:
            Source: C:\Windows\System32\msiexec.exeFile opened: y:
            Source: C:\Windows\System32\msiexec.exeFile opened: w:
            Source: C:\Windows\System32\msiexec.exeFile opened: u:
            Source: C:\Windows\System32\msiexec.exeFile opened: s:
            Source: C:\Windows\System32\msiexec.exeFile opened: q:
            Source: C:\Windows\System32\msiexec.exeFile opened: o:
            Source: C:\Windows\System32\msiexec.exeFile opened: m:
            Source: C:\Windows\System32\msiexec.exeFile opened: k:
            Source: C:\Windows\System32\msiexec.exeFile opened: i:
            Source: C:\Windows\System32\msiexec.exeFile opened: g:
            Source: C:\Windows\System32\msiexec.exeFile opened: e:
            Source: C:\Windows\SysWOW64\wermgr.exeFile opened: c:
            Source: C:\Windows\System32\msiexec.exeFile opened: a:

            Networking

            barindex
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 178.175.187.254:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 205.237.67.69:995
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 193.253.100.236:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 102.159.188.125:443
            Source: Malware configuration extractorIPs: 71.38.155.217:443
            Source: Malware configuration extractorIPs: 58.186.75.42:443
            Source: Malware configuration extractorIPs: 76.178.148.107:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 51.14.29.227:2222
            Source: Malware configuration extractorIPs: 59.28.84.65:443
            Source: Malware configuration extractorIPs: 173.88.135.179:443
            Source: Malware configuration extractorIPs: 103.144.201.56:2078
            Source: Malware configuration extractorIPs: 96.87.28.170:2222
            Source: Malware configuration extractorIPs: 105.186.128.181:995
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 151.62.238.176:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 122.186.210.254:443
            Source: Malware configuration extractorIPs: 82.125.44.236:2222
            Source: Malware configuration extractorIPs: 84.108.200.161:443
            Source: Malware configuration extractorIPs: 76.16.49.134:443
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 76.170.252.153:995
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 78.92.133.215:443
            Source: Malware configuration extractorIPs: 50.68.204.71:993
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 98.145.23.67:443
            Source: Malware configuration extractorIPs: 85.57.212.13:3389
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 69.242.31.249:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 75.143.236.149:443
            Source: Malware configuration extractorIPs: 14.192.241.76:995
            Source: Malware configuration extractorIPs: 86.195.14.72:2222
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 220.240.164.182:443
            Source: Malware configuration extractorIPs: 73.29.92.128:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 76.86.31.59:443
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 68.203.69.96:443
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 122.184.143.86:443
            Source: Malware configuration extractorIPs: 92.186.69.229:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 89.129.109.27:2222
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 151.65.167.77:443
            Source: Malware configuration extractorIPs: 86.132.236.117:443
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 89.36.206.69:995
            Source: Malware configuration extractorIPs: 96.56.197.26:2083
            Source: Malware configuration extractorIPs: 78.18.105.11:443
            Source: Malware configuration extractorIPs: 82.127.153.75:2222
            Source: Malware configuration extractorIPs: 90.78.147.141:2222
            Source: Malware configuration extractorIPs: 82.131.141.209:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 80.12.88.148:2222
            Source: Malware configuration extractorIPs: 69.133.162.35:443
            Source: Malware configuration extractorIPs: 172.115.17.50:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 24.198.114.130:995
            Source: Malware configuration extractorIPs: 50.68.204.71:443
            Source: Malware configuration extractorIPs: 69.119.123.159:2222
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 70.112.206.5:443
            Source: Malware configuration extractorIPs: 198.2.51.242:993
            Source: Malware configuration extractorIPs: 2.36.64.159:2078
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 147.219.4.194:443
            Source: Malware configuration extractorIPs: 116.74.164.81:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 12.172.173.82:995
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 104.35.24.154:443
            Source: Malware configuration extractorIPs: 213.64.33.61:2222
            Source: Malware configuration extractorIPs: 47.149.134.231:443
            Source: Malware configuration extractorIPs: 72.134.124.16:443
            Source: Malware configuration extractorIPs: 47.34.30.133:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 78.160.146.127:443
            Source: Malware configuration extractorIPs: 84.35.26.14:995
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 124.149.143.189:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 186.64.67.30:443
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 174.58.146.57:443
            Source: Malware configuration extractorIPs: 94.207.104.225:443
            Source: Malware configuration extractorIPs: 86.97.55.89:2222
            Source: Malware configuration extractorIPs: 69.123.4.221:2222
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewASN Name: ASN-CXA-ALL-CCI-22773-RDCUS ASN-CXA-ALL-CCI-22773-RDCUS
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: unknownNetwork traffic detected: IP country count 30
            Source: rundll32.exe, rundll32.exe, 00000007.00000002.1050425390.00000000100AE000.00000002.00000001.01000000.00000006.sdmp, main.dll.2.drString found in binary or memory: https://streams.videolan.org/upload/
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D9B0 mv_thread_message_queue_recv,AcquireSRWLockExclusive,SleepConditionVariableSRW,SleepConditionVariableSRW,mv_fifo_can_read,mv_fifo_can_read,ReleaseSRWLockExclusive,mv_fifo_read,WakeConditionVariable,mv_fifo_can_read,
            Source: 7.2.rundll32.exe.38a328.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 7.2.rundll32.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 7.2.rundll32.exe.38a328.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\6bb81b.ipiJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6bb81a.msiJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007A002
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004F020
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10080031
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D060
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10028070
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10085070
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002B0B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100500B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B0D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100500E1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007F101
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008144
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008D160
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10083180
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002A1B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100691B1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100101D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001021B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10058218
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10027220
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A722C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008A268
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007C260
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10033270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008A270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10024280
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100792E0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10088310
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10023350
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100353B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100243C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10082420
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A8460
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013480
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D4B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004C4C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D4D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001F523
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004E520
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A8599
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100105C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007F5D7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100215D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10084610
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10023620
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007B630
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A8637
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000164B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100206A7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004E720
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000E760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008B768
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010778
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007D7B6
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100977C9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100807C7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100897F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002A800
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10030800
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B830
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007E856
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10087860
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10026870
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10082895
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100798E0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10091900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D910
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10090910
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001F91B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1009D970
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010980
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001099C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100339C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100809D9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C9F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FA00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000AA10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10085A30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10091A40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007A50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EAC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FAE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FAF7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10025B10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000AB30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007BB30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10003BA5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10083BB1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FBC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001C10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DC10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EC10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007CC13
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1009AC38
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10031C30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000BC40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A6C8E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10004C96
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008ACB4
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000ECC9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DD40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000CD50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002DD90
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EDB0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007DC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004DDD0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10077E10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10086E10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10088E30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007FE67
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10023E60
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10004E92
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000CEA0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002EEB0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004FED0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10050F00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007EF35
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002EF48
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 100089C0 appears 35 times
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 77620000 page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 77740000 page execute and read and write
            Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\15dasx.msi"
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPluginJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\~DFA9753353B6A77A75.TMPJump to behavior
            Source: classification engineClassification label: mal92.troj.evad.winMSI@10/11@0/100
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{065B9DAD-62CE-4CBE-AFA4-0D608B2434EA}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{065B9DAD-62CE-4CBE-AFA4-0D608B2434EA}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{B4DCC149-5F2E-4517-ACAA-2922F89FD530}
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008F0EA push es; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001F523 mv_dict_get,LoadLibraryA,LoadLibraryA,InitOnceBeginInitialize,InitOnceComplete,LoadLibraryA,GetProcAddress,mv_log,atoi,mv_log,mv_log,GetProcAddress,
            Source: main.dll.2.drStatic PE information: real checksum: 0xf1b7b should be: 0xf8504
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
            Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2620 base: 2D2AFF value: E9 B4 E8 E2 FF
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exe TID: 2600Thread sleep time: -120000s >= -30000s
            Source: C:\Windows\System32\msiexec.exe TID: 2600Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\msiexec.exe TID: 616Thread sleep time: -300000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 2624Thread sleep count: 102 > 30
            Source: C:\Windows\SysWOW64\wermgr.exe TID: 2640Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10035030 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.1 %
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10035030 Start: 10035315 End: 1003515E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001F523 mv_dict_get,LoadLibraryA,LoadLibraryA,InitOnceBeginInitialize,InitOnceComplete,LoadLibraryA,GetProcAddress,mv_log,atoi,mv_log,mv_log,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10035030 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_3_00182297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001E0D9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 130000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 100000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 2D2AFF
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 100000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 130000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 100000 value starts with: 4D5A
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008DB50 cpuid
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A0AD0 GetCurrentThread,GetThreadTimes,GetSystemTimeAsFileTime,QueryPerformanceFrequency,QueryPerformanceCounter,GetCurrentProcess,GetProcessTimes,_errno,GetModuleHandleA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10092180 GetTimeZoneInformation,GetModuleHandleA,GetProcAddress,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.rundll32.exe.38a328.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.1b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.38a328.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.1050273322.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.1050043697.000000000037D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.rundll32.exe.38a328.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.1b0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.38a328.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.1050273322.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.1050043697.000000000037D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            11
            Scripting
            2
            Windows Service
            2
            Windows Service
            11
            Masquerading
            1
            Credential API Hooking
            2
            System Time Discovery
            1
            Replication Through Removable Media
            1
            Credential API Hooking
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts1
            Native API
            Boot or Logon Initialization Scripts311
            Process Injection
            1
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets11
            Peripheral Device Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common11
            Scripting
            Cached Domain Credentials24
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items2
            Obfuscated Files or Information
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Rundll32
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            File Deletion
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878630 Sample: 15dasx.msi Startdate: 30/05/2023 Architecture: WINDOWS Score: 92 25 2.36.64.159 VODAFONE-IT-ASNIT Italy 2->25 27 85.57.212.13 UNI2-ASES Spain 2->27 29 98 other IPs or domains 2->29 39 Found malware configuration 2->39 41 Yara detected Qbot 2->41 43 Sample uses string decryption to hide its real strings 2->43 45 C2 URLs / IPs found in malware configuration 2->45 9 msiexec.exe 83 25 2->9         started        12 msiexec.exe 3 2->12         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\main.dll, PE32 9->23 dropped 14 rundll32.exe 9->14         started        16 wscript.exe 9->16         started        process6 process7 18 rundll32.exe 14->18         started        signatures8 31 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 18->31 33 Writes to foreign memory regions 18->33 35 Allocates memory in foreign processes 18->35 37 2 other signatures 18->37 21 wermgr.exe 8 1 18->21         started        process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            15dasx.msi0%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://streams.videolan.org/upload/rundll32.exe, rundll32.exe, 00000007.00000002.1050425390.00000000100AE000.00000002.00000001.01000000.00000006.sdmp, main.dll.2.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              2.82.8.80
              unknownPortugal
              3243MEO-RESIDENCIALPTtrue
              70.160.67.203
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              75.143.236.149
              unknownUnited States
              20115CHARTER-20115UStrue
              83.110.223.61
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              86.195.14.72
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              84.215.202.8
              unknownNorway
              41164GET-NOGETNorwayNOtrue
              184.182.66.109
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              92.186.69.229
              unknownFrance
              12479UNI2-ASEStrue
              174.4.89.3
              unknownCanada
              6327SHAWCAtrue
              161.142.103.187
              unknownMalaysia
              9930TTNET-MYTIMEdotComBerhadMYtrue
              114.143.176.236
              unknownIndia
              17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
              14.192.241.76
              unknownMalaysia
              9534MAXIS-AS1-APBinariangBerhadMYtrue
              173.88.135.179
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              84.108.200.161
              unknownIsrael
              8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILtrue
              47.34.30.133
              unknownUnited States
              20115CHARTER-20115UStrue
              183.87.163.165
              unknownIndia
              132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
              184.181.75.148
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              124.149.143.189
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              84.35.26.14
              unknownNetherlands
              21221INFOPACT-ASTheNetherlandsNLtrue
              73.29.92.128
              unknownUnited States
              7922COMCAST-7922UStrue
              68.203.69.96
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              82.131.141.209
              unknownHungary
              20845DIGICABLEHUtrue
              64.121.161.102
              unknownUnited States
              6079RCN-ASUStrue
              178.175.187.254
              unknownMoldova Republic of
              43289TRABIAMDtrue
              96.56.197.26
              unknownUnited States
              6128CABLE-NET-1UStrue
              186.64.67.30
              unknownArgentina
              27953NODOSUDSAARtrue
              188.28.19.84
              unknownUnited Kingdom
              206067H3GUKGBtrue
              125.99.76.102
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              81.101.185.146
              unknownUnited Kingdom
              5089NTLGBtrue
              59.28.84.65
              unknownKorea Republic of
              4766KIXS-AS-KRKoreaTelecomKRtrue
              105.186.128.181
              unknownSouth Africa
              37457Telkom-InternetZAtrue
              76.86.31.59
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              147.147.30.126
              unknownUnited Kingdom
              6871PLUSNETUKInternetServiceProviderGBtrue
              96.87.28.170
              unknownUnited States
              7922COMCAST-7922UStrue
              75.109.111.89
              unknownUnited States
              19108SUDDENLINK-COMMUNICATIONSUStrue
              78.92.133.215
              unknownHungary
              5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUtrue
              124.122.47.148
              unknownThailand
              17552TRUE-AS-APTrueInternetCoLtdTHtrue
              88.126.94.4
              unknownFrance
              12322PROXADFRtrue
              51.14.29.227
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              85.57.212.13
              unknownSpain
              12479UNI2-ASEStrue
              47.205.25.170
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              95.45.50.93
              unknownIreland
              5466EIRCOMInternetHouseIEtrue
              80.12.88.148
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              69.133.162.35
              unknownUnited States
              11426TWC-11426-CAROLINASUStrue
              86.132.236.117
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              151.62.238.176
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              70.112.206.5
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              205.237.67.69
              unknownCanada
              11290CC-3272CAtrue
              102.159.188.125
              unknownTunisia
              37705TOPNETTNtrue
              151.65.167.77
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              76.178.148.107
              unknownUnited States
              10838OCEANIC-INTERNET-RRUStrue
              89.36.206.69
              unknownItaly
              48544TECNOADSL-ASITtrue
              69.242.31.249
              unknownUnited States
              7922COMCAST-7922UStrue
              193.253.100.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              76.16.49.134
              unknownUnited States
              7922COMCAST-7922UStrue
              94.207.104.225
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              201.244.108.183
              unknownColombia
              19429ETB-ColombiaCOtrue
              103.42.86.42
              unknownIndia
              133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
              78.18.105.11
              unknownIreland
              2110AS-BTIREBTIrelandwaspreviouslyknownasEsatNetEUnettrue
              80.6.50.34
              unknownUnited Kingdom
              5089NTLGBtrue
              103.144.201.56
              unknownunknown
              139762MSSOLUTION-AS-APSolutionBDtrue
              27.0.48.233
              unknownIndia
              132573SAINGN-AS-INSAINGNNetworkServicesINtrue
              70.28.50.223
              unknownCanada
              577BACOMCAtrue
              98.145.23.67
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              47.149.134.231
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              82.125.44.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              81.229.117.95
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              89.129.109.27
              unknownSpain
              12479UNI2-ASEStrue
              122.186.210.254
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              79.77.142.22
              unknownUnited Kingdom
              9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
              90.78.147.141
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              122.184.143.86
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              186.75.95.6
              unknownPanama
              11556CableWirelessPanamaPAtrue
              50.68.186.195
              unknownCanada
              6327SHAWCAtrue
              12.172.173.82
              unknownUnited States
              2386INS-ASUStrue
              213.64.33.61
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              79.168.224.165
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              86.97.55.89
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              176.142.207.63
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              92.154.17.149
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              174.58.146.57
              unknownUnited States
              7922COMCAST-7922UStrue
              78.160.146.127
              unknownTurkey
              9121TTNETTRtrue
              58.186.75.42
              unknownViet Nam
              18403FPT-AS-APTheCorporationforFinancingPromotingTechnolotrue
              223.166.13.95
              unknownChina
              17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
              65.95.141.84
              unknownCanada
              577BACOMCAtrue
              50.68.204.71
              unknownCanada
              6327SHAWCAtrue
              71.38.155.217
              unknownUnited States
              209CENTURYLINK-US-LEGACY-QWESTUStrue
              104.35.24.154
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              220.240.164.182
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              103.123.223.133
              unknownIndia
              138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
              24.198.114.130
              unknownUnited States
              11351TWC-11351-NORTHEASTUStrue
              2.36.64.159
              unknownItaly
              30722VODAFONE-IT-ASNITtrue
              198.2.51.242
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              92.9.45.20
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              113.11.92.30
              unknownBangladesh
              7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
              69.119.123.159
              unknownUnited States
              6128CABLE-NET-1UStrue
              69.123.4.221
              unknownUnited States
              6128CABLE-NET-1UStrue
              172.115.17.50
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              77.86.98.236
              unknownUnited Kingdom
              12390KINGSTON-UK-ASGBtrue
              147.219.4.194
              unknownUnited States
              1498DNIC-ASBLK-01498-01499UStrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:878630
              Start date and time:2023-05-30 22:46:08 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 35s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:15dasx.msi
              Detection:MAL
              Classification:mal92.troj.evad.winMSI@10/11@0/100
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 2.2% (good quality ratio 1.2%)
              • Quality average: 21.2%
              • Quality standard deviation: 26.1%
              HCA Information:
              • Successful, ratio: 94%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, VSSVC.exe, svchost.exe
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtFsControlFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
              TimeTypeDescription
              22:46:58API Interceptor1641x Sleep call for process: msiexec.exe modified
              22:47:25API Interceptor19x Sleep call for process: rundll32.exe modified
              22:47:25API Interceptor224x Sleep call for process: wscript.exe modified
              22:47:27API Interceptor184x Sleep call for process: wermgr.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):8650
              Entropy (8bit):5.55075152522519
              Encrypted:false
              SSDEEP:192:qXFAeUYEBwgq6YEBwg4rnNl0UVpK4XqaG/l:qW5wy5wFnj+
              MD5:2EB510D377D89068BE09E7B1E3D5A70A
              SHA1:DFF25995677E5F263F829188E8304ABDE3D994D5
              SHA-256:AE9951F7F09A03785CE94F7F4ECCD7A5DE0C4DE352234C83D6B6C929CBD03D04
              SHA-512:1DA3B55419CB12E97CF18639C794F15499284C534A59A9FFA5A5C2008E3BECEE3FA83CB08B54F72563497CB7A6D5B85A19B4377663E6C40145D6DB9C6FC1A1B5
              Malicious:false
              Reputation:low
              Preview:...@IXOS.@.....@..V.@.....@.....@.....@.....@.....@......&.{64EDF889-FC17-466B-8E9A-5A8688EB1CDC}'.Adobe Acrobat PDF Browser Plugin 4.8.25..15dasx.msi.@.....@.....@.....@........&.{6ECD3C06-98A2-44A1-A41E-271C903F257F}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}&.{64EDF889-FC17-466B-8E9A-5A8688EB1CDC}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\....B.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll....D.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs....WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....%.Software\AdobeAcrobatPDFBrowserPlugin...@....(.&...AdobeAcrobatPDFBro
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):962048
              Entropy (8bit):6.7504689709982175
              Encrypted:false
              SSDEEP:24576:D7AkdHt+UnNtqbVotX4Dw/9JGCZdBK/+NYouXFPn/yd47:DZ8RDwlJGoY7X7
              MD5:A55C357391C089F93F5EF157BE209F63
              SHA1:A859A7AB02760EE8CD4DCF219EB1D460371350A8
              SHA-256:8D0C96718D4C7944FB648DF446D70ABBB87C5D4FF7C9735CF3BD9B2F11246A9E
              SHA-512:36152E39BACA8A0566C31DB97FF35D30E995FED246509C9816966D49F82143155225FE4BF07B7975DB1BEDC299008442FEC05D5A7588C18F6FD6EE1E821A471B
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....0d...........#...'.....................................................0 .....{.....@... .........................hC...........0..x....................@..(A...........................a......................(................................text...$...........................`..`.data...............................@....rdata..$...........................@..@.bss....d............`...................edata..hC.......D...`..............@..@.idata..............................@....CRT....0...........................@....tls......... ......................@....rsrc...N....0......................@....reloc..(A.......B...l..............@..B................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):132
              Entropy (8bit):4.599233980549996
              Encrypted:false
              SSDEEP:3:LwBxFkvH4dGmMKLVKRLGPz4VAFkvH4dGmMKLVKRLGH:cHFkvYdlZKRLi7FkvYdlZKRL4
              MD5:0D4C9F15CE74465C59AE36A27F98C817
              SHA1:9CCE8EEFA4D3D9C5E161C5DBB860CFE1489C6B1A
              SHA-256:D24E3399060B51F3A1C9D41A67DE2601888A35C99DA8DB70070D757BB3F1913A
              SHA-512:9BED0EAFC2CF2A2360850CA1070FFB04AC14F04C78379485998A93F45012B5C11CC7F6F68129F65B8B5F90437CB965908C6A1BB9D83A56B068D6BDE1D5FDAD1F
              Malicious:false
              Preview:MsgBox "Adobe Acrobat PDF Browser Plugin installation error 0x00000328", 16, "Adobe Acrobat PDF Browser Plugin installation error"..
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):0.06981092353499595
              Encrypted:false
              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOzTuC77BhXKPQVky6lS:2F0i8n0itFzDHFPuC77HWS
              MD5:82E43552F0F7875FD425564DAB1C45C5
              SHA1:A85775C63AF567CCBCEECF01E8E10B3CB56661E7
              SHA-256:31D5DF542C7533A468E811F5E32ABD1B0988FC35D56A233FFC4CA4211202FB2A
              SHA-512:F1936D8774A71CF61F23D07D5076864EE447765BCEF5C00C6647EF8951C6CABA1486ADAD3C986A2C6904567D6601CE5C49DF990772ACFD19B5A0717796592842
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):69632
              Entropy (8bit):0.12120829877979931
              Encrypted:false
              SSDEEP:24:Cr7E818lOdWmDqqrb9ipVIdWmDqqrb9ipV7VIwGMlrkgQ+5:P818lEOMSoOMS5ZrQ
              MD5:F8B41D211697EEE05791DF7A862B3942
              SHA1:63B8F609BB546B14FBDB82E1B13B436A94260BBD
              SHA-256:55C89653912C2FE98C7DC855191898A4445FA78AE8C557CAABC00B58C5554747
              SHA-512:69247B964C815EAEAD5FDF960522BF3ADD008C9639A6C2B220F6A9CB8782393B7F4991FA71702BF2A7C3843FA03E3A0D4C8C34121B8D564B569E46AEEB6A075F
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {6ECD3C06-98A2-44A1-A41E-271C903F257F}, Create Time/Date: Tue May 30 15:19:58 2023, Last Saved Time/Date: Tue May 30 15:19:58 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):516096
              Entropy (8bit):7.918002678282303
              Encrypted:false
              SSDEEP:6144:jESkw7402pCiyBH6DlIxtWb9jOyHLmsjzcGet8Rghs0O892YptgrGzjkacDO+cDb:3kdiMHHLmKzQ8tfacDO+wVydjSavjQ
              MD5:AB8EF3423324168D06B2D122F75CA130
              SHA1:A7E273DDD7CDF303E366CBA16ABFD4C3966F2CF6
              SHA-256:4E70DA2D2EFC833EB5C450C9F82AAA7D433E31E39DC4EC36CA3C5DDDE0F4DC00
              SHA-512:8AADA720840A74A361D92DB1174D3AE8119FF2F70903A396BC0AE60ACFDFDF5D7FB781315B155F0B507B7B260A3F4FF8435DC9BA13E05F1547F2ABEA0C7DA220
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.5277141372259355
              Encrypted:false
              SSDEEP:24:JnFC/lym6cpmUHCAjluSXG+PdWmDqqrb9ipV7VIwGMlrkgsdWmDqqrb9ipVi8183:x0+cDHBluFqOMS5ZrmOMSI818l
              MD5:4F184BE6D7D0C90A3675262A41E494CC
              SHA1:FF0A74C16271E7EEDF96732229B90492921B52EC
              SHA-256:72D06F2C743AE20C220767EAB4FEAF666CAF92E31D0EE37DD4253027FE2E2B3F
              SHA-512:01D6D55927575C2E494E1B66605737512796803929C0E1935325F638F8847B532F5399BF0F443416B34372060DA38A73F2AA0AED322F1A8048466F6E20578A4E
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {6ECD3C06-98A2-44A1-A41E-271C903F257F}, Create Time/Date: Tue May 30 15:19:58 2023, Last Saved Time/Date: Tue May 30 15:19:58 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):516096
              Entropy (8bit):7.918002678282303
              Encrypted:false
              SSDEEP:6144:jESkw7402pCiyBH6DlIxtWb9jOyHLmsjzcGet8Rghs0O892YptgrGzjkacDO+cDb:3kdiMHHLmKzQ8tfacDO+wVydjSavjQ
              MD5:AB8EF3423324168D06B2D122F75CA130
              SHA1:A7E273DDD7CDF303E366CBA16ABFD4C3966F2CF6
              SHA-256:4E70DA2D2EFC833EB5C450C9F82AAA7D433E31E39DC4EC36CA3C5DDDE0F4DC00
              SHA-512:8AADA720840A74A361D92DB1174D3AE8119FF2F70903A396BC0AE60ACFDFDF5D7FB781315B155F0B507B7B260A3F4FF8435DC9BA13E05F1547F2ABEA0C7DA220
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):2138
              Entropy (8bit):5.589708162392856
              Encrypted:false
              SSDEEP:48:vf1lnOLJwCP3hDufg6YPRBoD8SY1eU/SnI1lnCpfaEVltdtu1lnMn:vXS+YPrAuedIofaEP8Mn
              MD5:98D6FE23EEFA66343D02362715DE6A1B
              SHA1:8F0C0BE4E71FF7D71A5A77DD823D70C39E506856
              SHA-256:65A632BED627509E9FF49A6A16666B11E4EBEA3A26FC069E6C156290F4023B0D
              SHA-512:F93FF717188D72156B2B1800427DBAC1445B045B2422859B9BFA160466AE6B9131595CCCB2826E99D850DC3D49A61BE0BF96478BE044EF693A641BE4B010190A
              Malicious:false
              Preview:...@IXOS.@.....@..V.@.....@.....@.....@.....@.....@......&.{64EDF889-FC17-466B-8E9A-5A8688EB1CDC}'.Adobe Acrobat PDF Browser Plugin 4.8.25..15dasx.msi.@.....@.....@.....@........&.{6ECD3C06-98A2-44A1-A41E-271C903F257F}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}F.01:\Software\AdobeAcrobatPDFBrowserPlugin\AdobeAcrobatPDFBrowserPlugin.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@......:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\..).1\xssanpen\|AdobeAcrobatPDFBrowserPlugin\......Please insert the disk: ..media3.cab.@.....@......C:\Windows\Installer\6bb81a.msi.........@........main.dll..dll_main..main.dll.@.....@.....@.......@...
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.1628561562250028
              Encrypted:false
              SSDEEP:12:JSbX72Fj3SAGiLIlHVRpth/7777777777777777777777777vDHFPuC77HrpSl0G:JUQI5pFBHlF
              MD5:A30D6EE443F5F383CD600F105CD74165
              SHA1:E5CCC5ADD0A5AB95D5168E4889C4D8BA6CB24CA5
              SHA-256:A1A5E17B1DDA584A2FBDF8AAB33A2F3962F8775A13E7E314CA344E04B4C5BDA7
              SHA-512:38F505EB2F6A414216EE88C79ED62CF6460C38564108BEAB177F8218A2E0262B4299D87DA52C1DFFC377C177FC94B0808818770567DB211FB84AD90620A759A5
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {6ECD3C06-98A2-44A1-A41E-271C903F257F}, Create Time/Date: Tue May 30 15:19:58 2023, Last Saved Time/Date: Tue May 30 15:19:58 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Entropy (8bit):7.918002678282303
              TrID:
              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
              File name:15dasx.msi
              File size:516096
              MD5:ab8ef3423324168d06b2d122f75ca130
              SHA1:a7e273ddd7cdf303e366cba16abfd4c3966f2cf6
              SHA256:4e70da2d2efc833eb5c450c9f82aaa7d433e31e39dc4ec36ca3c5ddde0f4dc00
              SHA512:8aada720840a74a361d92db1174d3ae8119ff2f70903a396bc0ae60acfdfdf5d7fb781315b155f0b507b7b260a3f4ff8435dc9ba13e05f1547f2abea0c7da220
              SSDEEP:6144:jESkw7402pCiyBH6DlIxtWb9jOyHLmsjzcGet8Rghs0O892YptgrGzjkacDO+cDb:3kdiMHHLmKzQ8tfacDO+wVydjSavjQ
              TLSH:DDB4231536022373C5014B72DC9D87ECA70A3E59756AB61F7E09F8480EB6B7D12B72A3
              File Content Preview:........................>......................................................................................................................................................................................................................................
              Icon Hash:2d2e3797b32b2b99
              No network behavior found

              Click to jump to process

              Target ID:1
              Start time:22:46:57
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\15dasx.msi"
              Imagebase:0xff740000
              File size:128512 bytes
              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:2
              Start time:22:46:58
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\msiexec.exe /V
              Imagebase:0xff740000
              File size:128512 bytes
              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:5
              Start time:22:47:25
              Start date:30/05/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0xffa30000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:22:47:25
              Start date:30/05/2023
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
              Imagebase:0xff870000
              File size:168960 bytes
              MD5 hash:045451FA238A75305CC26AC982472367
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:22:47:25
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0x80000
              File size:44544 bytes
              MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.1050273322.00000000023DD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.1050043697.000000000037D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:high

              Target ID:8
              Start time:22:47:27
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\wermgr.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\wermgr.exe
              Imagebase:0x2d0000
              File size:53760 bytes
              MD5 hash:C9905EA4C326DAB778B9297BA5BD1889
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              No disassembly