Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
15dasx.msi

Overview

General Information

Sample Name:15dasx.msi
Analysis ID:878630
MD5:ab8ef3423324168d06b2d122f75ca130
SHA1:a7e273ddd7cdf303e366cba16abfd4c3966f2cf6
SHA256:4e70da2d2efc833eb5c450c9f82aaa7d433e31e39dc4ec36ca3c5ddde0f4dc00
Tags:msi
Infos:

Detection

Qbot
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Potentially malicious time measurement code found
Queries the volume information (name, serial number etc) of a device
Yara signature match
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Connects to several IPs in different countries
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • msiexec.exe (PID: 5760 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\15dasx.msi" MD5: 4767B71A318E201188A0D0A420C8B608)
  • msiexec.exe (PID: 5708 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 4767B71A318E201188A0D0A420C8B608)
    • rundll32.exe (PID: 5184 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 4028 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • wermgr.exe (PID: 6944 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: CCF15E662ED5CE77B5FF1A7AAE305233)
    • wscript.exe (PID: 1008 cmdline: wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "BB30", "Campaign": "1685433861", "Version": "404.1320", "C2 list": ["12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.186.128.181:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078", "12.172.173.82:995", "77.86.98.236:443", "104.35.24.154:443", "213.64.33.61:2222", "47.149.134.231:443", "72.134.124.16:443", "47.34.30.133:443", "103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "188.28.19.84:443", "174.58.146.57:443", "94.207.104.225:443", "86.97.55.89:2222", "69.123.4.221:2222"]}
SourceRuleDescriptionAuthorStrings
00000006.00000002.554365630.000000000084A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000006.00000002.554539683.0000000001110000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        6.2.rundll32.exe.fb0000.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        6.2.rundll32.exe.fb0000.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          6.2.rundll32.exe.860830.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xdf71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0x9b97:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          6.2.rundll32.exe.860830.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            6.2.rundll32.exe.860830.0.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000006.00000002.554365630.000000000084A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685433861", "Version": "404.1320", "C2 list": ["12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.186.128.181:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078", "12.172.173.82:995", "77.86.98.236:443", "104.35.24.154:443", "213.64.33.61:2222", "47.149.134.231:443", "72.134.124.16:443", "47.34.30.133:443", "103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "188.28.19.84:443", "174.58.146.57:443", "94.207.104.225:443", "86.97.55.89:2222", "69.123.4.221:2222"]}
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: netstat -nao
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: runas
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ipconfig /all
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: net localgroup
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Microsoft
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELF_TEST_1
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: p%08x
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Self test FAILED!!!
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Self test OK.
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: /t5
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: whoami /all
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: cmd
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: route print
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .lnk
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: arp -a
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: net share
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: cmd.exe /c set
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Self check
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %u;%u;%u;
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ProfileImagePath
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ProgramData
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Self check ok!
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: powershell.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: qwinsta
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: net view
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Component_08
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Start screenshot
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: appidapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: c:\ProgramData
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Component_07
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: powershell.exe -encodedCommand
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: netstat -nao
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: runas
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ipconfig /all
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SystemRoot
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: cscript.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: image/jpeg
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: LocalLow
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: displayName
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: shlwapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CommandLine
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: kernel32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: 1234567890
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wbj.go
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_DiskDrive
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: System32
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Name
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: WRSA.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: c:\\
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SpyNetReporting
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: FALSE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aswhookx.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Packages
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: RepUx.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Winsta0
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: root\SecurityCenter2
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: MsMpEng.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: userenv.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: csc_ui.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: \\.\pipe\
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: pstorec.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: NTUSER.DAT
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: from
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: netapi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: gdi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: setupapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: iphlpapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CrAmTray.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: user32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: \sf2.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Software\Microsoft
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %S.%06d
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: bcrypt.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wtsapi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: shell32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: TRUE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_Bios
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: */*
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ByteFence.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: type=0x%04X
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ROOT\CIMV2
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: https
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: fshoster32.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: kernelbase.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: regsvr32.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %s\system32\
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_Process
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: rundll32.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: LOCALAPPDATA
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: cmd.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: APPDATA
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: select
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: mcshield.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: advapi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ws2_32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .cfg
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_Product
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: WQL
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wininet.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: LastBootUpTime
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: urlmon.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Create
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_PnPEntity
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Initializing database...
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: winsta0\default
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .dat
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: WBJ_IGNORE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: next
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wpcap.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: image/pjpeg
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: fmon.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: vbs
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aswhooka.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SysWOW64
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: mpr.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: image/gif
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: crypt32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ntdll.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: open
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SystemRoot
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: cscript.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: image/jpeg
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: LocalLow
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: displayName
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: shlwapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CommandLine
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: kernel32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: 1234567890
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wbj.go
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_DiskDrive
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: System32
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Name
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: WRSA.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: c:\\
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SpyNetReporting
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: FALSE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aswhookx.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Packages
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: RepUx.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Winsta0
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: root\SecurityCenter2
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: MsMpEng.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: userenv.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: csc_ui.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: \\.\pipe\
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: pstorec.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: NTUSER.DAT
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: from
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: netapi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: gdi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: setupapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: iphlpapi.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CrAmTray.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: user32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: \sf2.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Software\Microsoft
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %S.%06d
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: bcrypt.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wtsapi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: shell32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: TRUE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_Bios
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: */*
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ByteFence.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: type=0x%04X
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ROOT\CIMV2
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: https
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: fshoster32.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: kernelbase.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: regsvr32.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %s\system32\
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_Process
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: rundll32.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: LOCALAPPDATA
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: cmd.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: APPDATA
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: select
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: mcshield.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: advapi32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ws2_32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .cfg
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_Product
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: WQL
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wininet.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: LastBootUpTime
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: urlmon.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Create
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Win32_PnPEntity
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Initializing database...
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: winsta0\default
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: .dat
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: WBJ_IGNORE
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: next
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: wpcap.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: image/pjpeg
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: fmon.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: vbs
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: aswhooka.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: SysWOW64
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: mpr.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: image/gif
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: crypt32.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: ntdll.dll
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: open
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 6.2.rundll32.exe.fb0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10035030 mv_get_random_seed,BCryptOpenAlgorithmProvider,BCryptGenRandom,BCryptCloseAlgorithmProvider,mvpriv_open,_read,_close,mvpriv_open,_read,_close,clock,clock,mv_sha_init,mv_sha_update,mv_sha_final,mv_log,abort,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100500A3 mv_twofish_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000C0B0 mv_cast5_crypt2,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000B0D0 mv_camellia_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10013100 mv_encryption_init_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_mallocz,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_calloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000C1B0 mv_cast5_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100132D0 mv_encryption_init_info_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10002480 mv_aes_ctr_crypt,mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10013480 mv_encryption_init_info_get_side_data,mv_encryption_init_info_alloc,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100084B0 mv_blowfish_crypt,mv_blowfish_crypt_ecb,mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004D4B0 mv_tea_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100364E0 mv_rc4_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10002523 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001363B mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000867B mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100136FB mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10013860 mv_encryption_init_info_add_side_data,mv_malloc,mv_malloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10012A70 mv_encryption_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_calloc,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10012B40 mv_encryption_info_clone,mv_encryption_info_alloc,
            Source: C:\Windows\System32\msiexec.exeFile opened: z:
            Source: C:\Windows\System32\msiexec.exeFile opened: x:
            Source: C:\Windows\System32\msiexec.exeFile opened: v:
            Source: C:\Windows\System32\msiexec.exeFile opened: t:
            Source: C:\Windows\System32\msiexec.exeFile opened: r:
            Source: C:\Windows\System32\msiexec.exeFile opened: p:
            Source: C:\Windows\System32\msiexec.exeFile opened: n:
            Source: C:\Windows\System32\msiexec.exeFile opened: l:
            Source: C:\Windows\System32\msiexec.exeFile opened: j:
            Source: C:\Windows\System32\msiexec.exeFile opened: h:
            Source: C:\Windows\System32\msiexec.exeFile opened: f:
            Source: C:\Windows\System32\msiexec.exeFile opened: b:
            Source: C:\Windows\System32\msiexec.exeFile opened: y:
            Source: C:\Windows\System32\msiexec.exeFile opened: w:
            Source: C:\Windows\System32\msiexec.exeFile opened: u:
            Source: C:\Windows\System32\msiexec.exeFile opened: s:
            Source: C:\Windows\System32\msiexec.exeFile opened: q:
            Source: C:\Windows\System32\msiexec.exeFile opened: o:
            Source: C:\Windows\System32\msiexec.exeFile opened: m:
            Source: C:\Windows\System32\msiexec.exeFile opened: k:
            Source: C:\Windows\System32\msiexec.exeFile opened: i:
            Source: C:\Windows\System32\msiexec.exeFile opened: g:
            Source: C:\Windows\System32\msiexec.exeFile opened: e:
            Source: C:\Windows\System32\wscript.exeFile opened: c:
            Source: C:\Windows\System32\msiexec.exeFile opened: a:

            Networking

            barindex
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 178.175.187.254:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 205.237.67.69:995
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 193.253.100.236:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 102.159.188.125:443
            Source: Malware configuration extractorIPs: 71.38.155.217:443
            Source: Malware configuration extractorIPs: 58.186.75.42:443
            Source: Malware configuration extractorIPs: 76.178.148.107:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 51.14.29.227:2222
            Source: Malware configuration extractorIPs: 59.28.84.65:443
            Source: Malware configuration extractorIPs: 173.88.135.179:443
            Source: Malware configuration extractorIPs: 103.144.201.56:2078
            Source: Malware configuration extractorIPs: 96.87.28.170:2222
            Source: Malware configuration extractorIPs: 105.186.128.181:995
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 151.62.238.176:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 122.186.210.254:443
            Source: Malware configuration extractorIPs: 82.125.44.236:2222
            Source: Malware configuration extractorIPs: 84.108.200.161:443
            Source: Malware configuration extractorIPs: 76.16.49.134:443
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 76.170.252.153:995
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 78.92.133.215:443
            Source: Malware configuration extractorIPs: 50.68.204.71:993
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 98.145.23.67:443
            Source: Malware configuration extractorIPs: 85.57.212.13:3389
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 69.242.31.249:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 75.143.236.149:443
            Source: Malware configuration extractorIPs: 14.192.241.76:995
            Source: Malware configuration extractorIPs: 86.195.14.72:2222
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 220.240.164.182:443
            Source: Malware configuration extractorIPs: 73.29.92.128:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 76.86.31.59:443
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 68.203.69.96:443
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 122.184.143.86:443
            Source: Malware configuration extractorIPs: 92.186.69.229:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 89.129.109.27:2222
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 151.65.167.77:443
            Source: Malware configuration extractorIPs: 86.132.236.117:443
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 89.36.206.69:995
            Source: Malware configuration extractorIPs: 96.56.197.26:2083
            Source: Malware configuration extractorIPs: 78.18.105.11:443
            Source: Malware configuration extractorIPs: 82.127.153.75:2222
            Source: Malware configuration extractorIPs: 90.78.147.141:2222
            Source: Malware configuration extractorIPs: 82.131.141.209:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 80.12.88.148:2222
            Source: Malware configuration extractorIPs: 69.133.162.35:443
            Source: Malware configuration extractorIPs: 172.115.17.50:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 24.198.114.130:995
            Source: Malware configuration extractorIPs: 50.68.204.71:443
            Source: Malware configuration extractorIPs: 69.119.123.159:2222
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 70.112.206.5:443
            Source: Malware configuration extractorIPs: 198.2.51.242:993
            Source: Malware configuration extractorIPs: 2.36.64.159:2078
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 147.219.4.194:443
            Source: Malware configuration extractorIPs: 116.74.164.81:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 12.172.173.82:995
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 104.35.24.154:443
            Source: Malware configuration extractorIPs: 213.64.33.61:2222
            Source: Malware configuration extractorIPs: 47.149.134.231:443
            Source: Malware configuration extractorIPs: 72.134.124.16:443
            Source: Malware configuration extractorIPs: 47.34.30.133:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 78.160.146.127:443
            Source: Malware configuration extractorIPs: 84.35.26.14:995
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 124.149.143.189:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 186.64.67.30:443
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 174.58.146.57:443
            Source: Malware configuration extractorIPs: 94.207.104.225:443
            Source: Malware configuration extractorIPs: 86.97.55.89:2222
            Source: Malware configuration extractorIPs: 69.123.4.221:2222
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewASN Name: ASN-CXA-ALL-CCI-22773-RDCUS ASN-CXA-ALL-CCI-22773-RDCUS
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: Joe Sandbox ViewIP Address: 70.160.67.203 70.160.67.203
            Source: unknownNetwork traffic detected: IP country count 30
            Source: rundll32.exe, rundll32.exe, 00000006.00000002.554837079.00000000100AE000.00000002.00000001.01000000.00000005.sdmp, main.dll.2.drString found in binary or memory: https://streams.videolan.org/upload/
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004D9B0 mv_thread_message_queue_recv,AcquireSRWLockExclusive,SleepConditionVariableSRW,SleepConditionVariableSRW,mv_fifo_can_read,mv_fifo_can_read,ReleaseSRWLockExclusive,mv_fifo_read,WakeConditionVariable,mv_fifo_can_read,
            Source: 6.2.rundll32.exe.fb0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 6.2.rundll32.exe.860830.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 6.2.rundll32.exe.860830.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\61e624.msiJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\61e622.msiJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004F020
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000D060
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10028070
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100500A3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002B0B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000B0D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100500E1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10008144
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002A1A1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100101D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001021B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10058218
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10027220
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10033261
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10007270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10024280
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10023350
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100353B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100243C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10013480
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004D4B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004C4C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000D4D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004E517
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001F523
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100105C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100215D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10023620
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000164B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100206A7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004E71B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10010750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000E760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10010778
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002A800
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10030800
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000B830
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10026870
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10001900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10091900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000D910
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001F91B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1009D970
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10010980
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001099C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100339B9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000C9F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000FA00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000AA10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10091A40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10007A50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000EAC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000FAE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000FAF7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10025B0C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000AB30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10003BA5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 100089C0 appears 32 times
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
            Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\15dasx.msi"
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPluginJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF1942D938D9238C10.TMPJump to behavior
            Source: classification engineClassification label: mal92.troj.evad.winMSI@10/21@0/100
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{B8083B9F-5F92-428D-9F9F-70E8D5BB328A}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{B8083B9F-5F92-428D-9F9F-70E8D5BB328A}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{CE145F37-D420-4881-8117-69BB8378B64A}
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100A2A90 push eax; mov dword ptr [esp], esi
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001F523 mv_dict_get,LoadLibraryA,LoadLibraryA,InitOnceBeginInitialize,InitOnceComplete,LoadLibraryA,GetProcAddress,mv_log,atoi,mv_log,mv_log,GetProcAddress,
            Source: main.dll.2.drStatic PE information: real checksum: 0xf1b7b should be: 0xf8504
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dllJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6944 base: 913C50 value: E9 63 D7 4F 02
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 3984Thread sleep count: 182 > 30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10035030 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.1 %
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10035030 Start: 10035315 End: 1003515E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001F523 mv_dict_get,LoadLibraryA,LoadLibraryA,InitOnceBeginInitialize,InitOnceComplete,LoadLibraryA,GetProcAddress,mv_log,atoi,mv_log,mv_log,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10035030 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_3_00E82297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001E0D9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 2E40000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 2E10000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 913C50
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 2E10000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 2E40000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 2E10000 value starts with: 4D5A
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1008DB50 cpuid
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100A0AD0 GetCurrentThread,GetThreadTimes,GetSystemTimeAsFileTime,QueryPerformanceFrequency,QueryPerformanceCounter,GetCurrentProcess,GetProcessTimes,_errno,GetModuleHandleA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10092180 GetTimeZoneInformation,GetModuleHandleA,GetProcAddress,
            Source: rundll32.exe, 00000006.00000003.545687978.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: rundll32.exe, 00000006.00000003.545687978.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
            Source: rundll32.exe, 00000006.00000003.545687978.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: rundll32.exe, 00000006.00000003.545687978.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
            Source: rundll32.exe, 00000006.00000003.545687978.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: rundll32.exe, 00000006.00000003.545687978.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 6.2.rundll32.exe.fb0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.rundll32.exe.860830.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.rundll32.exe.860830.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.554365630.000000000084A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.554539683.0000000001110000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 6.2.rundll32.exe.fb0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.rundll32.exe.860830.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.rundll32.exe.860830.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.554365630.000000000084A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.554539683.0000000001110000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            11
            Scripting
            1
            DLL Side-Loading
            311
            Process Injection
            11
            Masquerading
            1
            Credential API Hooking
            2
            System Time Discovery
            1
            Replication Through Removable Media
            1
            Credential API Hooking
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Virtualization/Sandbox Evasion
            LSASS Memory2
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets11
            Peripheral Device Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common11
            Scripting
            Cached Domain Credentials24
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items2
            Obfuscated Files or Information
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Rundll32
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            DLL Side-Loading
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
            File Deletion
            Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878630 Sample: 15dasx.msi Startdate: 30/05/2023 Architecture: WINDOWS Score: 92 25 2.36.64.159 VODAFONE-IT-ASNIT Italy 2->25 27 85.57.212.13 UNI2-ASES Spain 2->27 29 98 other IPs or domains 2->29 39 Found malware configuration 2->39 41 Yara detected Qbot 2->41 43 Sample uses string decryption to hide its real strings 2->43 45 C2 URLs / IPs found in malware configuration 2->45 9 msiexec.exe 77 30 2->9         started        12 msiexec.exe 3 2->12         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\main.dll, PE32 9->23 dropped 14 rundll32.exe 9->14         started        16 wscript.exe 9->16         started        process6 process7 18 rundll32.exe 14->18         started        signatures8 31 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 18->31 33 Writes to foreign memory regions 18->33 35 Allocates memory in foreign processes 18->35 37 2 other signatures 18->37 21 wermgr.exe 8 1 18->21         started        process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            15dasx.msi0%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://streams.videolan.org/upload/rundll32.exe, rundll32.exe, 00000006.00000002.554837079.00000000100AE000.00000002.00000001.01000000.00000005.sdmp, main.dll.2.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              2.82.8.80
              unknownPortugal
              3243MEO-RESIDENCIALPTtrue
              70.160.67.203
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              75.143.236.149
              unknownUnited States
              20115CHARTER-20115UStrue
              83.110.223.61
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              86.195.14.72
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              84.215.202.8
              unknownNorway
              41164GET-NOGETNorwayNOtrue
              184.182.66.109
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              92.186.69.229
              unknownFrance
              12479UNI2-ASEStrue
              174.4.89.3
              unknownCanada
              6327SHAWCAtrue
              161.142.103.187
              unknownMalaysia
              9930TTNET-MYTIMEdotComBerhadMYtrue
              114.143.176.236
              unknownIndia
              17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
              14.192.241.76
              unknownMalaysia
              9534MAXIS-AS1-APBinariangBerhadMYtrue
              173.88.135.179
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              84.108.200.161
              unknownIsrael
              8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILtrue
              47.34.30.133
              unknownUnited States
              20115CHARTER-20115UStrue
              183.87.163.165
              unknownIndia
              132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
              184.181.75.148
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              124.149.143.189
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              84.35.26.14
              unknownNetherlands
              21221INFOPACT-ASTheNetherlandsNLtrue
              73.29.92.128
              unknownUnited States
              7922COMCAST-7922UStrue
              68.203.69.96
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              82.131.141.209
              unknownHungary
              20845DIGICABLEHUtrue
              64.121.161.102
              unknownUnited States
              6079RCN-ASUStrue
              178.175.187.254
              unknownMoldova Republic of
              43289TRABIAMDtrue
              96.56.197.26
              unknownUnited States
              6128CABLE-NET-1UStrue
              186.64.67.30
              unknownArgentina
              27953NODOSUDSAARtrue
              188.28.19.84
              unknownUnited Kingdom
              206067H3GUKGBtrue
              125.99.76.102
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              81.101.185.146
              unknownUnited Kingdom
              5089NTLGBtrue
              59.28.84.65
              unknownKorea Republic of
              4766KIXS-AS-KRKoreaTelecomKRtrue
              105.186.128.181
              unknownSouth Africa
              37457Telkom-InternetZAtrue
              76.86.31.59
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              147.147.30.126
              unknownUnited Kingdom
              6871PLUSNETUKInternetServiceProviderGBtrue
              96.87.28.170
              unknownUnited States
              7922COMCAST-7922UStrue
              75.109.111.89
              unknownUnited States
              19108SUDDENLINK-COMMUNICATIONSUStrue
              78.92.133.215
              unknownHungary
              5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUtrue
              124.122.47.148
              unknownThailand
              17552TRUE-AS-APTrueInternetCoLtdTHtrue
              88.126.94.4
              unknownFrance
              12322PROXADFRtrue
              51.14.29.227
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              85.57.212.13
              unknownSpain
              12479UNI2-ASEStrue
              47.205.25.170
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              95.45.50.93
              unknownIreland
              5466EIRCOMInternetHouseIEtrue
              80.12.88.148
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              69.133.162.35
              unknownUnited States
              11426TWC-11426-CAROLINASUStrue
              86.132.236.117
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              151.62.238.176
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              70.112.206.5
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              205.237.67.69
              unknownCanada
              11290CC-3272CAtrue
              102.159.188.125
              unknownTunisia
              37705TOPNETTNtrue
              151.65.167.77
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              76.178.148.107
              unknownUnited States
              10838OCEANIC-INTERNET-RRUStrue
              89.36.206.69
              unknownItaly
              48544TECNOADSL-ASITtrue
              69.242.31.249
              unknownUnited States
              7922COMCAST-7922UStrue
              193.253.100.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              76.16.49.134
              unknownUnited States
              7922COMCAST-7922UStrue
              94.207.104.225
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              201.244.108.183
              unknownColombia
              19429ETB-ColombiaCOtrue
              103.42.86.42
              unknownIndia
              133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
              78.18.105.11
              unknownIreland
              2110AS-BTIREBTIrelandwaspreviouslyknownasEsatNetEUnettrue
              80.6.50.34
              unknownUnited Kingdom
              5089NTLGBtrue
              103.144.201.56
              unknownunknown
              139762MSSOLUTION-AS-APSolutionBDtrue
              27.0.48.233
              unknownIndia
              132573SAINGN-AS-INSAINGNNetworkServicesINtrue
              70.28.50.223
              unknownCanada
              577BACOMCAtrue
              98.145.23.67
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              47.149.134.231
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              82.125.44.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              81.229.117.95
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              89.129.109.27
              unknownSpain
              12479UNI2-ASEStrue
              122.186.210.254
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              79.77.142.22
              unknownUnited Kingdom
              9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
              90.78.147.141
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              122.184.143.86
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              186.75.95.6
              unknownPanama
              11556CableWirelessPanamaPAtrue
              50.68.186.195
              unknownCanada
              6327SHAWCAtrue
              12.172.173.82
              unknownUnited States
              2386INS-ASUStrue
              213.64.33.61
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              79.168.224.165
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              86.97.55.89
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              176.142.207.63
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              92.154.17.149
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              174.58.146.57
              unknownUnited States
              7922COMCAST-7922UStrue
              78.160.146.127
              unknownTurkey
              9121TTNETTRtrue
              58.186.75.42
              unknownViet Nam
              18403FPT-AS-APTheCorporationforFinancingPromotingTechnolotrue
              223.166.13.95
              unknownChina
              17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
              65.95.141.84
              unknownCanada
              577BACOMCAtrue
              50.68.204.71
              unknownCanada
              6327SHAWCAtrue
              71.38.155.217
              unknownUnited States
              209CENTURYLINK-US-LEGACY-QWESTUStrue
              104.35.24.154
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              220.240.164.182
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              103.123.223.133
              unknownIndia
              138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
              24.198.114.130
              unknownUnited States
              11351TWC-11351-NORTHEASTUStrue
              2.36.64.159
              unknownItaly
              30722VODAFONE-IT-ASNITtrue
              198.2.51.242
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              92.9.45.20
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              113.11.92.30
              unknownBangladesh
              7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
              69.119.123.159
              unknownUnited States
              6128CABLE-NET-1UStrue
              69.123.4.221
              unknownUnited States
              6128CABLE-NET-1UStrue
              172.115.17.50
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              77.86.98.236
              unknownUnited Kingdom
              12390KINGSTON-UK-ASGBtrue
              147.219.4.194
              unknownUnited States
              1498DNIC-ASBLK-01498-01499UStrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:878630
              Start date and time:2023-05-30 22:54:44 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 35s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Run name:Potential for more IOCs and behavior
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:15dasx.msi
              Detection:MAL
              Classification:mal92.troj.evad.winMSI@10/21@0/100
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 5% (good quality ratio 2.2%)
              • Quality average: 19.7%
              • Quality standard deviation: 28.2%
              HCA Information:
              • Successful, ratio: 89%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Close Viewer
              • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • VT rate limit hit for: 15dasx.msi
              TimeTypeDescription
              22:55:51API Interceptor9x Sleep call for process: wermgr.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:modified
              Size (bytes):8918
              Entropy (8bit):5.58962421937737
              Encrypted:false
              SSDEEP:192:zXF6eaSEBwgr6SEBwgQH6NBIUVpy8T8amhl:z6rwPrwJc3i
              MD5:5E1B15017AF6242863525CEA042AE1E7
              SHA1:B1FFD512C754AA8AE9EA56A28E365C00119E6101
              SHA-256:4C9CFC15B5802B3FEFDB33C25095CD51A2DB9F1BCADF0F55AFBB4FC9A14AB7D9
              SHA-512:65FFC4E9437045D22CB345773768930DB4D97D195E08FBD2E89FA2F03E4D80991F6D8A9A87C3FC70C4E31B639C45BC80CAF933ED7F40CD435B1951C564939192
              Malicious:false
              Preview:...@IXOS.@.....@...V.@.....@.....@.....@.....@.....@......&.{64EDF889-FC17-466B-8E9A-5A8688EB1CDC}'.Adobe Acrobat PDF Browser Plugin 4.8.25..15dasx.msi.@.....@.....@.....@........&.{6ECD3C06-98A2-44A1-A41E-271C903F257F}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}&.{64EDF889-FC17-466B-8E9A-5A8688EB1CDC}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\....B.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll....D.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs....WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....%.Software\AdobeAcrobatPDFBrowserPlugin...@....(.&...AdobeAcrobatPDFBro
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):962048
              Entropy (8bit):6.7504689709982175
              Encrypted:false
              SSDEEP:24576:D7AkdHt+UnNtqbVotX4Dw/9JGCZdBK/+NYouXFPn/yd47:DZ8RDwlJGoY7X7
              MD5:A55C357391C089F93F5EF157BE209F63
              SHA1:A859A7AB02760EE8CD4DCF219EB1D460371350A8
              SHA-256:8D0C96718D4C7944FB648DF446D70ABBB87C5D4FF7C9735CF3BD9B2F11246A9E
              SHA-512:36152E39BACA8A0566C31DB97FF35D30E995FED246509C9816966D49F82143155225FE4BF07B7975DB1BEDC299008442FEC05D5A7588C18F6FD6EE1E821A471B
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....0d...........#...'.....................................................0 .....{.....@... .........................hC...........0..x....................@..(A...........................a......................(................................text...$...........................`..`.data...............................@....rdata..$...........................@..@.bss....d............`...................edata..hC.......D...`..............@..@.idata..............................@....CRT....0...........................@....tls......... ......................@....rsrc...N....0......................@....reloc..(A.......B...l..............@..B................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):132
              Entropy (8bit):4.599233980549996
              Encrypted:false
              SSDEEP:3:LwBxFkvH4dGmMKLVKRLGPz4VAFkvH4dGmMKLVKRLGH:cHFkvYdlZKRLi7FkvYdlZKRL4
              MD5:0D4C9F15CE74465C59AE36A27F98C817
              SHA1:9CCE8EEFA4D3D9C5E161C5DBB860CFE1489C6B1A
              SHA-256:D24E3399060B51F3A1C9D41A67DE2601888A35C99DA8DB70070D757BB3F1913A
              SHA-512:9BED0EAFC2CF2A2360850CA1070FFB04AC14F04C78379485998A93F45012B5C11CC7F6F68129F65B8B5F90437CB965908C6A1BB9D83A56B068D6BDE1D5FDAD1F
              Malicious:false
              Preview:MsgBox "Adobe Acrobat PDF Browser Plugin installation error 0x00000328", 16, "Adobe Acrobat PDF Browser Plugin installation error"..
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {6ECD3C06-98A2-44A1-A41E-271C903F257F}, Create Time/Date: Tue May 30 15:19:58 2023, Last Saved Time/Date: Tue May 30 15:19:58 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):516096
              Entropy (8bit):7.918002678282303
              Encrypted:false
              SSDEEP:6144:jESkw7402pCiyBH6DlIxtWb9jOyHLmsjzcGet8Rghs0O892YptgrGzjkacDO+cDb:3kdiMHHLmKzQ8tfacDO+wVydjSavjQ
              MD5:AB8EF3423324168D06B2D122F75CA130
              SHA1:A7E273DDD7CDF303E366CBA16ABFD4C3966F2CF6
              SHA-256:4E70DA2D2EFC833EB5C450C9F82AAA7D433E31E39DC4EC36CA3C5DDDE0F4DC00
              SHA-512:8AADA720840A74A361D92DB1174D3AE8119FF2F70903A396BC0AE60ACFDFDF5D7FB781315B155F0B507B7B260A3F4FF8435DC9BA13E05F1547F2ABEA0C7DA220
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {6ECD3C06-98A2-44A1-A41E-271C903F257F}, Create Time/Date: Tue May 30 15:19:58 2023, Last Saved Time/Date: Tue May 30 15:19:58 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):516096
              Entropy (8bit):7.918002678282303
              Encrypted:false
              SSDEEP:6144:jESkw7402pCiyBH6DlIxtWb9jOyHLmsjzcGet8Rghs0O892YptgrGzjkacDO+cDb:3kdiMHHLmKzQ8tfacDO+wVydjSavjQ
              MD5:AB8EF3423324168D06B2D122F75CA130
              SHA1:A7E273DDD7CDF303E366CBA16ABFD4C3966F2CF6
              SHA-256:4E70DA2D2EFC833EB5C450C9F82AAA7D433E31E39DC4EC36CA3C5DDDE0F4DC00
              SHA-512:8AADA720840A74A361D92DB1174D3AE8119FF2F70903A396BC0AE60ACFDFDF5D7FB781315B155F0B507B7B260A3F4FF8435DC9BA13E05F1547F2ABEA0C7DA220
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):2138
              Entropy (8bit):5.594517269430135
              Encrypted:false
              SSDEEP:48:uf1lnOLJwCP3PDufgL8YPRBoD8SY1eU/L4nLu1lnCnfaEVltdtc1ln2n:uXSx8YPrAuei4LeefaEP62n
              MD5:0B9D3C758584EFBC3D985C5162C20293
              SHA1:C52730B3195BB336B0EF282A2BD0156370E58946
              SHA-256:7258FD70ADEAA67C3FF2519AFD0B9B202A113D3E1A7CDB79AD14093211596014
              SHA-512:E7CE00C7CBD26543B17EE34BE456CAD607FCED4A8696670AA0FE36557EAB998AE92F731BC7F90DCD9CE43A3F3BC9BCB1711BCFA1F93969FB63F68E7D79877D6C
              Malicious:false
              Preview:...@IXOS.@.....@...V.@.....@.....@.....@.....@.....@......&.{64EDF889-FC17-466B-8E9A-5A8688EB1CDC}'.Adobe Acrobat PDF Browser Plugin 4.8.25..15dasx.msi.@.....@.....@.....@........&.{6ECD3C06-98A2-44A1-A41E-271C903F257F}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}F.01:\Software\AdobeAcrobatPDFBrowserPlugin\AdobeAcrobatPDFBrowserPlugin.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@......:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\..).1\xssanpen\|AdobeAcrobatPDFBrowserPlugin\......Please insert the disk: ..media3.cab.@.....@......C:\Windows\Installer\61e622.msi.........@........main.dll..dll_main..main.dll.@.....@.....@.......@...
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.1628561562250028
              Encrypted:false
              SSDEEP:12:JSbX72FjSSAGiLIlHVRpth/7777777777777777777777777vDHFPuC77HrpSl0G:JASQI5pFBHlF
              MD5:761F50755F94D674E4A0718AE489EEA6
              SHA1:376CD210E0C0A763F0275EB0FAFA81854D53CD4C
              SHA-256:C50AF6F0221FC0F08047984BD35891BC143B85051F0F713DF8FEDDF4459F8DB8
              SHA-512:0BFF860E332AC3E530CCA69FFDEB7CB65A942759984B0B1A9DE21B9609A099FE8684C9F776E51AEF9011AC2347030D1BB034C6EB6AAB24EF423CDE2946F2C889
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.5046533420623267
              Encrypted:false
              SSDEEP:48:S8PhfuRc06WXJ8FT50zPHW9MS5o7rD6W9MSI818l:9hf1fFTaTjA
              MD5:F5A23A6FA744EEF09C2A7F8541FE5DBD
              SHA1:58DF694B007EF6DA2684EE80B1A150FBD06B1548
              SHA-256:3DA02C45DDA5D077670C8CDD0D85A7CEC4D36FB08AAAE3E70A8FA6A3E04CB15F
              SHA-512:79EF5CB1B4B46677FB0432A43533B0D7C6A2092BF627E5B9186BF067BB59CAFB9F6A82340BBD627780EC7A20811A3D746CC9D2F578A647A4D1EFDC2B5688F2E5
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
              Category:dropped
              Size (bytes):79122
              Entropy (8bit):5.2821177886063175
              Encrypted:false
              SSDEEP:192:jmXs969ozNSkk3peTBYeHt0tfoI9qsjl0urmwYyidu:yXs9UogeWeH29qclhmwYyidu
              MD5:F2FB6C9C2B6BE3CF826D2DBE6C29F575
              SHA1:8D7A1AB2F22024BD1E7F41506C05DAC7967EC6D8
              SHA-256:6DC9DFDE23D1421DDA60C7A94E25C4DE0024FCFE965CFA186EF5F55A085638DA
              SHA-512:10CE96B3726376A8956F5462C4DF497295574872976D52D3EFAFBE57EB89070570BBF3D5128785D11D92EE4DF14F784B1306970826DB34039114F23078B89D89
              Malicious:false
              Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..07/23/2020 03:22:38.143 [320]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.Outlook, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 03:22:38.159 [320]: ngen returning 0x00000000..07/23/2020 03:22:38.222 [3748]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.Word, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 03:22:38.237 [3748]: ngen returning 0x00000000..07/23/2020 03:22:38.284 [64]: Command line: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install Microsoft.Office.Tools.Common.Implementation, Version=10.0.0.00000, Culture=neutral, PublicKeyToken=B03F5F7F11D50A3A /queue:3 /NoDependencies ..07/23/2020 03:22:38.300 [64]:
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):1.2093196290859516
              Encrypted:false
              SSDEEP:48:1sHugPveFXJxT5AzPHW9MS5o7rD6W9MSI818l:iHAJTWTjA
              MD5:18D15B6891825B20A3FBBD04738B6633
              SHA1:69E5E10D9DE4E4C3E0C9F4D9AD51C071228EB6B1
              SHA-256:5788AACC4AC4E19C88C167DE4CF4E160D4065A20C3A317FD96AD8DA3432ED381
              SHA-512:F052F7D843B69C8CECE9DFA8A683188C3CD1CB37E2457942E358F143D0C000F5F9124FE680F0A1A19745788E604CB934A74DB51D85A8FB5BA9F11A00152390A0
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):69632
              Entropy (8bit):0.12041817052530558
              Encrypted:false
              SSDEEP:24:Cr7I818lOdWm29qrb9ipVIdWm29qrb9ipV7V2BwG/lrkgX+Yre8:j818lEW9MSoW9MS5o7rXp1
              MD5:A5ACCD3443CED8BC0B4137E3EA396278
              SHA1:CCA264CCC071A3FCC3AEA76C934A3F9C313D61D4
              SHA-256:463244DE3829B3C5D994719E93594B2BB0BF9E382BBEEAE37E153BE97C8DED9E
              SHA-512:4F9B9577C32DB85762287074EBD87BE04D617AC15D9857613E1F81216B52BB14708D84EC2244D0BFB8DA8834B6EA1470EC622714D76366E1B80654ECE958BACB
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):1.2093196290859516
              Encrypted:false
              SSDEEP:48:1sHugPveFXJxT5AzPHW9MS5o7rD6W9MSI818l:iHAJTWTjA
              MD5:18D15B6891825B20A3FBBD04738B6633
              SHA1:69E5E10D9DE4E4C3E0C9F4D9AD51C071228EB6B1
              SHA-256:5788AACC4AC4E19C88C167DE4CF4E160D4065A20C3A317FD96AD8DA3432ED381
              SHA-512:F052F7D843B69C8CECE9DFA8A683188C3CD1CB37E2457942E358F143D0C000F5F9124FE680F0A1A19745788E604CB934A74DB51D85A8FB5BA9F11A00152390A0
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.5046533420623267
              Encrypted:false
              SSDEEP:48:S8PhfuRc06WXJ8FT50zPHW9MS5o7rD6W9MSI818l:9hf1fFTaTjA
              MD5:F5A23A6FA744EEF09C2A7F8541FE5DBD
              SHA1:58DF694B007EF6DA2684EE80B1A150FBD06B1548
              SHA-256:3DA02C45DDA5D077670C8CDD0D85A7CEC4D36FB08AAAE3E70A8FA6A3E04CB15F
              SHA-512:79EF5CB1B4B46677FB0432A43533B0D7C6A2092BF627E5B9186BF067BB59CAFB9F6A82340BBD627780EC7A20811A3D746CC9D2F578A647A4D1EFDC2B5688F2E5
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):1.2093196290859516
              Encrypted:false
              SSDEEP:48:1sHugPveFXJxT5AzPHW9MS5o7rD6W9MSI818l:iHAJTWTjA
              MD5:18D15B6891825B20A3FBBD04738B6633
              SHA1:69E5E10D9DE4E4C3E0C9F4D9AD51C071228EB6B1
              SHA-256:5788AACC4AC4E19C88C167DE4CF4E160D4065A20C3A317FD96AD8DA3432ED381
              SHA-512:F052F7D843B69C8CECE9DFA8A683188C3CD1CB37E2457942E358F143D0C000F5F9124FE680F0A1A19745788E604CB934A74DB51D85A8FB5BA9F11A00152390A0
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.5046533420623267
              Encrypted:false
              SSDEEP:48:S8PhfuRc06WXJ8FT50zPHW9MS5o7rD6W9MSI818l:9hf1fFTaTjA
              MD5:F5A23A6FA744EEF09C2A7F8541FE5DBD
              SHA1:58DF694B007EF6DA2684EE80B1A150FBD06B1548
              SHA-256:3DA02C45DDA5D077670C8CDD0D85A7CEC4D36FB08AAAE3E70A8FA6A3E04CB15F
              SHA-512:79EF5CB1B4B46677FB0432A43533B0D7C6A2092BF627E5B9186BF067BB59CAFB9F6A82340BBD627780EC7A20811A3D746CC9D2F578A647A4D1EFDC2B5688F2E5
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):0.06981092353499595
              Encrypted:false
              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOzTuC77BhXKPQVky6lS:2F0i8n0itFzDHFPuC77HWS
              MD5:82E43552F0F7875FD425564DAB1C45C5
              SHA1:A85775C63AF567CCBCEECF01E8E10B3CB56661E7
              SHA-256:31D5DF542C7533A468E811F5E32ABD1B0988FC35D56A233FFC4CA4211202FB2A
              SHA-512:F1936D8774A71CF61F23D07D5076864EE447765BCEF5C00C6647EF8951C6CABA1486ADAD3C986A2C6904567D6601CE5C49DF990772ACFD19B5A0717796592842
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {6ECD3C06-98A2-44A1-A41E-271C903F257F}, Create Time/Date: Tue May 30 15:19:58 2023, Last Saved Time/Date: Tue May 30 15:19:58 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Entropy (8bit):7.918002678282303
              TrID:
              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
              File name:15dasx.msi
              File size:516096
              MD5:ab8ef3423324168d06b2d122f75ca130
              SHA1:a7e273ddd7cdf303e366cba16abfd4c3966f2cf6
              SHA256:4e70da2d2efc833eb5c450c9f82aaa7d433e31e39dc4ec36ca3c5ddde0f4dc00
              SHA512:8aada720840a74a361d92db1174d3ae8119ff2f70903a396bc0ae60acfdfdf5d7fb781315b155f0b507b7b260a3f4ff8435dc9ba13e05f1547f2abea0c7da220
              SSDEEP:6144:jESkw7402pCiyBH6DlIxtWb9jOyHLmsjzcGet8Rghs0O892YptgrGzjkacDO+cDb:3kdiMHHLmKzQ8tfacDO+wVydjSavjQ
              TLSH:DDB4231536022373C5014B72DC9D87ECA70A3E59756AB61F7E09F8480EB6B7D12B72A3
              File Content Preview:........................>......................................................................................................................................................................................................................................
              Icon Hash:2d2e3797b32b2b99
              No network behavior found

              Click to jump to process

              Target ID:0
              Start time:22:55:39
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\15dasx.msi"
              Imagebase:0x7ff7d4ee0000
              File size:66048 bytes
              MD5 hash:4767B71A318E201188A0D0A420C8B608
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:2
              Start time:22:55:39
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\msiexec.exe /V
              Imagebase:0x7ff7d4ee0000
              File size:66048 bytes
              MD5 hash:4767B71A318E201188A0D0A420C8B608
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:4
              Start time:22:55:42
              Start date:30/05/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0x7ff7004d0000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:22:55:42
              Start date:30/05/2023
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
              Imagebase:0x7ff68fed0000
              File size:163840 bytes
              MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:22:55:42
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0x11b0000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000006.00000002.554365630.000000000084A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000006.00000002.554539683.0000000001110000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:high

              Target ID:7
              Start time:22:55:46
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\wermgr.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\wermgr.exe
              Imagebase:0x7ff7c72c0000
              File size:191904 bytes
              MD5 hash:CCF15E662ED5CE77B5FF1A7AAE305233
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              No disassembly