Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5q4psw.msi

Overview

General Information

Sample Name:5q4psw.msi
Analysis ID:878635
MD5:e35727b10193fe55df216a1f9d166997
SHA1:9ddafa77fc9fdea0085e41aa0f3a1ee0d15d9c8a
SHA256:696156d9a4117cba652b18b012db376fddfbd7db8b26a638c760d61b98d3590d
Tags:msi
Infos:

Detection

Qbot
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Potentially malicious time measurement code found
May use bcdedit to modify the Windows boot settings
Queries the volume information (name, serial number etc) of a device
Yara signature match
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Found inlined nop instructions (likely shell or obfuscated code)
Modifies existing windows services
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Connects to several IPs in different countries
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)
Creates or modifies windows services
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w7x64
  • msiexec.exe (PID: 2372 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\5q4psw.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 684 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • rundll32.exe (PID: 3380 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 3396 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 3476 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: C9905EA4C326DAB778B9297BA5BD1889)
    • wscript.exe (PID: 3388 cmdline: wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs MD5: 045451FA238A75305CC26AC982472367)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "obama265", "Campaign": "1685436052", "Version": "404.1320", "C2 list": ["103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "94.207.104.225:443", "89.114.140.100:443", "213.64.33.61:2222", "86.176.144.234:2222", "72.134.124.16:443", "47.34.30.133:443", "109.50.149.241:2222", "85.104.105.67:443", "81.111.108.123:443", "86.173.2.12:2222", "188.28.19.84:443", "41.228.224.161:995", "12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.184.103.97:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.1048899180.000000000257D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000007.00000002.1048686575.000000000038D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        7.2.rundll32.exe.39a328.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xdf71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0x9b97:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        7.2.rundll32.exe.39a328.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          7.2.rundll32.exe.180000.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          7.2.rundll32.exe.180000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            7.2.rundll32.exe.39a328.1.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000007.00000002.1048686575.000000000038D000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "obama265", "Campaign": "1685436052", "Version": "404.1320", "C2 list": ["103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "94.207.104.225:443", "89.114.140.100:443", "213.64.33.61:2222", "86.176.144.234:2222", "72.134.124.16:443", "47.34.30.133:443", "109.50.149.241:2222", "85.104.105.67:443", "81.111.108.123:443", "86.173.2.12:2222", "188.28.19.84:443", "41.228.224.161:995", "12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.184.103.97:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078"]}
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: netstat -nao
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: runas
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ipconfig /all
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: net localgroup
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Microsoft
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELF_TEST_1
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: p%08x
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Self test FAILED!!!
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Self test OK.
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: /t5
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: whoami /all
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: cmd
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: route print
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .lnk
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: arp -a
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: net share
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: cmd.exe /c set
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Self check
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %u;%u;%u;
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ProfileImagePath
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ProgramData
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Self check ok!
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: powershell.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: qwinsta
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: net view
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Component_08
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Start screenshot
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: appidapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: c:\ProgramData
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Component_07
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: powershell.exe -encodedCommand
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: netstat -nao
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: runas
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ipconfig /all
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SystemRoot
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: cscript.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: C:\INTERNAL\__empty
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_PhysicalMemory
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ALLUSERSPROFILE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: image/jpeg
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: LocalLow
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: displayName
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: shlwapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CommandLine
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: kernel32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SubmitSamplesConsent
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: 1234567890
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wbj.go
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_DiskDrive
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: System32
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Name
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: WRSA.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: c:\\
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SpyNetReporting
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: FALSE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aswhookx.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Packages
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: application/x-shockwave-flash
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: RepUx.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Winsta0
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: avp.exe;kavtray.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: root\SecurityCenter2
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: MsMpEng.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: userenv.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: csc_ui.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: \\.\pipe\
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: pstorec.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: NTUSER.DAT
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: from
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: netapi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: gdi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: setupapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: iphlpapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CrAmTray.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_ComputerSystem
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: user32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: \sf2.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: egui.exe;ekrn.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Software\Microsoft
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %S.%06d
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: bcrypt.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wtsapi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: shell32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: TRUE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_Bios
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: c:\hiberfil.sysss
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: */*
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ByteFence.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: type=0x%04X
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: snxhk_border_mywnd
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ROOT\CIMV2
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: https
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: fshoster32.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: kernelbase.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: regsvr32.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %s\system32\
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_Process
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: rundll32.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: LOCALAPPDATA
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: cmd.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: APPDATA
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: select
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: mcshield.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: advapi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ws2_32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .cfg
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_Product
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: WQL
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wininet.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: LastBootUpTime
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: urlmon.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Create
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_PnPEntity
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Initializing database...
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: winsta0\default
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .dat
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: WBJ_IGNORE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: next
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wpcap.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: image/pjpeg
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: fmon.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: vbs
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aswhooka.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SysWOW64
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: mpr.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: image/gif
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: crypt32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ntdll.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: open
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SystemRoot
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: cscript.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: C:\INTERNAL\__empty
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_PhysicalMemory
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ALLUSERSPROFILE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: image/jpeg
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: LocalLow
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: displayName
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: shlwapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CommandLine
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: kernel32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SubmitSamplesConsent
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: 1234567890
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wbj.go
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_DiskDrive
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: System32
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Name
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: WRSA.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: c:\\
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SpyNetReporting
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: FALSE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aswhookx.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Packages
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: application/x-shockwave-flash
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: RepUx.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Winsta0
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: avp.exe;kavtray.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: root\SecurityCenter2
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: MsMpEng.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: userenv.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: csc_ui.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: \\.\pipe\
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: pstorec.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: NTUSER.DAT
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: from
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: netapi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: gdi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: setupapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: iphlpapi.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CrAmTray.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_ComputerSystem
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: user32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: \sf2.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: egui.exe;ekrn.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Software\Microsoft
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %S.%06d
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: bcrypt.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wtsapi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: shell32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: TRUE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_Bios
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: c:\hiberfil.sysss
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: */*
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ByteFence.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: type=0x%04X
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: snxhk_border_mywnd
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ROOT\CIMV2
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: https
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: fshoster32.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: kernelbase.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: regsvr32.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %s\system32\
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_Process
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: rundll32.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: LOCALAPPDATA
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: cmd.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: APPDATA
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: select
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: mcshield.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: advapi32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ws2_32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .cfg
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_Product
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: WQL
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wininet.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: LastBootUpTime
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: urlmon.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Create
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Win32_PnPEntity
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Initializing database...
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: winsta0\default
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: .dat
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: WBJ_IGNORE
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: next
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: wpcap.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: image/pjpeg
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: fmon.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: vbs
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: aswhooka.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: SysWOW64
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: mpr.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: image/gif
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: crypt32.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: ntdll.dll
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: open
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 7.2.rundll32.exe.180000.0.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C0B0 mv_cast5_crypt2,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B0D0 mv_camellia_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013100 mv_encryption_init_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_mallocz,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_calloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C1B0 mv_cast5_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100132D0 mv_encryption_init_info_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10002480 mv_aes_ctr_crypt,mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013480 mv_encryption_init_info_get_side_data,mv_encryption_init_info_alloc,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100084B0 mv_blowfish_crypt,mv_blowfish_crypt_ecb,mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 mv_get_random_seed,BCryptOpenAlgorithmProvider,BCryptGenRandom,BCryptCloseAlgorithmProvider,mvpriv_open,_read,_close,mvpriv_open,_read,_close,clock,clock,mv_sha_init,mv_sha_update,mv_sha_final,mv_log,abort,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10002523 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D590 mv_twofish_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001363B mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000867B mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100136FB mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013860 mv_encryption_init_info_add_side_data,mv_malloc,mv_malloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004A990 mv_tea_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100339C0 mv_rc4_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012A70 mv_encryption_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_calloc,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012B40 mv_encryption_info_clone,mv_encryption_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001BF0 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008DCB0 mv_xtea_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012CF0 mv_encryption_info_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012D40 mv_encryption_info_get_side_data,mv_encryption_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007DC0 mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008DDF0 mv_xtea_le_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010E40 mv_des_crypt,
            Source: C:\Windows\System32\msiexec.exeFile opened: z:
            Source: C:\Windows\System32\msiexec.exeFile opened: x:
            Source: C:\Windows\System32\msiexec.exeFile opened: v:
            Source: C:\Windows\System32\msiexec.exeFile opened: t:
            Source: C:\Windows\System32\msiexec.exeFile opened: r:
            Source: C:\Windows\System32\msiexec.exeFile opened: p:
            Source: C:\Windows\System32\msiexec.exeFile opened: n:
            Source: C:\Windows\System32\msiexec.exeFile opened: l:
            Source: C:\Windows\System32\msiexec.exeFile opened: j:
            Source: C:\Windows\System32\msiexec.exeFile opened: h:
            Source: C:\Windows\System32\msiexec.exeFile opened: f:
            Source: C:\Windows\System32\msiexec.exeFile opened: b:
            Source: C:\Windows\System32\msiexec.exeFile opened: y:
            Source: C:\Windows\System32\msiexec.exeFile opened: w:
            Source: C:\Windows\System32\msiexec.exeFile opened: u:
            Source: C:\Windows\System32\msiexec.exeFile opened: s:
            Source: C:\Windows\System32\msiexec.exeFile opened: q:
            Source: C:\Windows\System32\msiexec.exeFile opened: o:
            Source: C:\Windows\System32\msiexec.exeFile opened: m:
            Source: C:\Windows\System32\msiexec.exeFile opened: k:
            Source: C:\Windows\System32\msiexec.exeFile opened: i:
            Source: C:\Windows\System32\msiexec.exeFile opened: g:
            Source: C:\Windows\System32\msiexec.exeFile opened: e:
            Source: C:\Windows\SysWOW64\wermgr.exeFile opened: c:
            Source: C:\Windows\System32\msiexec.exeFile opened: a:
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then push ebx
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]

            Networking

            barindex
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 78.160.146.127:443
            Source: Malware configuration extractorIPs: 84.35.26.14:995
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 124.149.143.189:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 186.64.67.30:443
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 94.207.104.225:443
            Source: Malware configuration extractorIPs: 89.114.140.100:443
            Source: Malware configuration extractorIPs: 213.64.33.61:2222
            Source: Malware configuration extractorIPs: 86.176.144.234:2222
            Source: Malware configuration extractorIPs: 72.134.124.16:443
            Source: Malware configuration extractorIPs: 47.34.30.133:443
            Source: Malware configuration extractorIPs: 109.50.149.241:2222
            Source: Malware configuration extractorIPs: 85.104.105.67:443
            Source: Malware configuration extractorIPs: 81.111.108.123:443
            Source: Malware configuration extractorIPs: 86.173.2.12:2222
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 41.228.224.161:995
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 178.175.187.254:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 205.237.67.69:995
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 193.253.100.236:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 102.159.188.125:443
            Source: Malware configuration extractorIPs: 71.38.155.217:443
            Source: Malware configuration extractorIPs: 58.186.75.42:443
            Source: Malware configuration extractorIPs: 76.178.148.107:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 51.14.29.227:2222
            Source: Malware configuration extractorIPs: 59.28.84.65:443
            Source: Malware configuration extractorIPs: 173.88.135.179:443
            Source: Malware configuration extractorIPs: 103.144.201.56:2078
            Source: Malware configuration extractorIPs: 96.87.28.170:2222
            Source: Malware configuration extractorIPs: 105.184.103.97:995
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 151.62.238.176:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 122.186.210.254:443
            Source: Malware configuration extractorIPs: 82.125.44.236:2222
            Source: Malware configuration extractorIPs: 84.108.200.161:443
            Source: Malware configuration extractorIPs: 76.16.49.134:443
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 76.170.252.153:995
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 78.92.133.215:443
            Source: Malware configuration extractorIPs: 50.68.204.71:993
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 98.145.23.67:443
            Source: Malware configuration extractorIPs: 85.57.212.13:3389
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 69.242.31.249:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 75.143.236.149:443
            Source: Malware configuration extractorIPs: 14.192.241.76:995
            Source: Malware configuration extractorIPs: 86.195.14.72:2222
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 220.240.164.182:443
            Source: Malware configuration extractorIPs: 73.29.92.128:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 76.86.31.59:443
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 68.203.69.96:443
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 122.184.143.86:443
            Source: Malware configuration extractorIPs: 92.186.69.229:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 89.129.109.27:2222
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 151.65.167.77:443
            Source: Malware configuration extractorIPs: 86.132.236.117:443
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 89.36.206.69:995
            Source: Malware configuration extractorIPs: 96.56.197.26:2083
            Source: Malware configuration extractorIPs: 78.18.105.11:443
            Source: Malware configuration extractorIPs: 82.127.153.75:2222
            Source: Malware configuration extractorIPs: 90.78.147.141:2222
            Source: Malware configuration extractorIPs: 82.131.141.209:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 80.12.88.148:2222
            Source: Malware configuration extractorIPs: 69.133.162.35:443
            Source: Malware configuration extractorIPs: 172.115.17.50:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 24.198.114.130:995
            Source: Malware configuration extractorIPs: 50.68.204.71:443
            Source: Malware configuration extractorIPs: 69.119.123.159:2222
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 70.112.206.5:443
            Source: Malware configuration extractorIPs: 198.2.51.242:993
            Source: Malware configuration extractorIPs: 2.36.64.159:2078
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 147.219.4.194:443
            Source: Malware configuration extractorIPs: 116.74.164.81:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewASN Name: ASN-CXA-ALL-CCI-22773-RDCUS ASN-CXA-ALL-CCI-22773-RDCUS
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: unknownNetwork traffic detected: IP country count 30
            Source: rundll32.exe, rundll32.exe, 00000007.00000002.1049111602.00000000100AB000.00000002.00000001.01000000.00000006.sdmp, main.dll.2.drString found in binary or memory: https://streams.videolan.org/upload/
            Source: 7.2.rundll32.exe.39a328.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 7.2.rundll32.exe.180000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 7.2.rundll32.exe.39a328.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\66172b.ipiJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\66172a.msiJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10079010
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D060
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10081091
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B0D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007A0F3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10098118
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002F110
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008144
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A415E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A615C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10088194
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100101D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001021B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002B270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004B2B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100752F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100842F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10086310
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007D347
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10021340
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002C390
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D3B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004E3E0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007C415
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002C428
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013480
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D4D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100774E2
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004C500
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007D511
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10025550
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10082550
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10028590
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D590
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100105C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004D5C1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007C5E1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008A640
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000164B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A566C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10080660
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10027690
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10066691
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A46FC
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100556F8
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10024700
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10087748
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10079740
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10030750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10087750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000E760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10021760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010778
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A57A5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100767C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100857F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B830
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10020830
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100A5843
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032890
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100218A0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007F900
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D910
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10010980
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004A990
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001099C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100499A0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000C9F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FA00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004BA00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000AA10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007A50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007CAB7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001EAB0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EAC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FAE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FAF7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10081AF0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10020B00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10078B10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000AB30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10003BA5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FBC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004BC00
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001C10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DC10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EC10
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000BC40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10088C48
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007AC96
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10004C96
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007DCA7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10094CA9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000ECC9
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10086CD0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10027CE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002DCE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007BD36
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DD40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10084D40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000CD50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10023D50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1007FD75
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000EDB0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007DC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10076DC0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008EDE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008DDF0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1009AE50
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 100089C0 appears 34 times
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 77620000 page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 77740000 page execute and read and write
            Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\5q4psw.msi"
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPluginJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\~DF081EC1EE06C4DD73.TMPJump to behavior
            Source: metadata-2.2.drBinary string: highlight.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\66program files\windows sidebar\gadgets\rssfeeds.gadgeticon.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: wmplayer.exe.mui22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\BBprogram files (x86)\windows sidebar\gadgets\weather.gadget\images**undocked_black_moon-new_partly-cloudy.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\((windows\diagnostics\system\device\en-us
            Source: metadata-2.2.drBinary string: buttonup_off.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: system.web.dynamicdata.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\BBprogram files (x86)\windows sidebar\gadgets\weather.gadget\images33docked_black_moon-waxing-gibbous_partly-cloudy.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
            Source: metadata-2.2.drBinary string: system.addin.contract.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: btn-previous-static.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
            Source: metadata-2.2.drBinary string: keypad.xml22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\99program files\dvd maker\shared\dvdstyles\specialoccasion,,specialnavigationup_selectionsubpicture.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
            Source: metadata-2.2.drBinary string: scenes_intro_bg_pal.wmv22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: metadata-2.2.drBinary string: acxtrnal.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\((windows\diagnostics\system\device\en-us
            Source: metadata-2.2.drBinary string: sbdrop.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
            Source: classification engineClassification label: mal96.troj.evad.winMSI@10/14@0/100
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{89DB3598-82DB-49D8-976D-727294C5AF4C}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{9F770E45-C862-4727-ABE3-3711E87F646A}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{89DB3598-82DB-49D8-976D-727294C5AF4C}
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008C51C push es; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008C5CA push es; ret
            Source: main.dll.2.drStatic PE information: real checksum: 0xe9e0f should be: 0xf51fe
            Source: metadata-2.2.drBinary or memory string: bcdedit.exe22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: metadata-2.2.drBinary or memory string: bcdedit.exe.mui22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
            Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3476 base: 6E2AFF value: E9 B4 E8 9D FF
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE7:
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BEHAVIORDUMPER.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000009.00000003.1096224638.0000000001D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE'
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000009.00000003.1096224638.0000000001D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE9
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000009.00000003.1096224638.0000000001D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXE1
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE<
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000009.00000003.1096224638.0000000001D38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE<
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
            Source: wermgr.exe, 00000009.00000003.1096148478.0000000001D36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
            Source: C:\Windows\System32\msiexec.exe TID: 1076Thread sleep time: -180000s >= -30000s
            Source: C:\Windows\System32\msiexec.exe TID: 1076Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\msiexec.exe TID: 2816Thread sleep time: -360000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 3400Thread sleep count: 120 > 30
            Source: C:\Windows\SysWOW64\wermgr.exe TID: 3496Thread sleep time: -45000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.0 %
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: metadata-2.2.drBinary or memory string: lsm.exe22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests,,microsoft-hyper-v-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
            Source: metadata-2.2.drBinary or memory string: iasmigplugin-dl.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests33microsoft-hyper-v-client-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\##windows\system32\spp\tokens\ppdlic
            Source: metadata-2.2.drBinary or memory string: iasmigplugin-dl.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\syswow64\migwiz\replacementmanifests33microsoft-hyper-v-client-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\,,program files (x86)\internet explorer\en-us
            Source: metadata-2.2.drBinary or memory string: imscmig.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests44microsoft-hyper-v-drivers-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 Start: 100327F5 End: 1003263E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032510 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_3_00172297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002A9E9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: F0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: C0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 6E2AFF
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: C0000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: F0000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: C0000 value starts with: 4D5A
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008B030 cpuid
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1008F660 GetTimeZoneInformation,GetModuleHandleA,GetProcAddress,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.rundll32.exe.39a328.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.180000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.39a328.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.1048899180.000000000257D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.1048686575.000000000038D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.rundll32.exe.39a328.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.180000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.rundll32.exe.39a328.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.1048899180.000000000257D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.1048686575.000000000038D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            11
            Scripting
            2
            Windows Service
            2
            Windows Service
            11
            Masquerading
            1
            Credential API Hooking
            1
            System Time Discovery
            1
            Replication Through Removable Media
            1
            Credential API Hooking
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/Job1
            Bootkit
            311
            Process Injection
            1
            Virtualization/Sandbox Evasion
            LSASS Memory111
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets11
            Peripheral Device Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common11
            Scripting
            Cached Domain Credentials23
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Bootkit
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            Rundll32
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
            File Deletion
            Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878635 Sample: 5q4psw.msi Startdate: 30/05/2023 Architecture: WINDOWS Score: 96 25 2.36.64.159 VODAFONE-IT-ASNIT Italy 2->25 27 85.57.212.13 UNI2-ASES Spain 2->27 29 98 other IPs or domains 2->29 39 Found malware configuration 2->39 41 Yara detected Qbot 2->41 43 Sample uses string decryption to hide its real strings 2->43 45 2 other signatures 2->45 9 msiexec.exe 85 28 2->9         started        12 msiexec.exe 3 2->12         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\main.dll, PE32 9->23 dropped 14 rundll32.exe 9->14         started        16 wscript.exe 9->16         started        process6 process7 18 rundll32.exe 14->18         started        signatures8 31 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 18->31 33 Writes to foreign memory regions 18->33 35 Allocates memory in foreign processes 18->35 37 2 other signatures 18->37 21 wermgr.exe 8 1 18->21         started        process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            5q4psw.msi5%ReversingLabs
            5q4psw.msi5%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll4%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://streams.videolan.org/upload/rundll32.exe, rundll32.exe, 00000007.00000002.1049111602.00000000100AB000.00000002.00000001.01000000.00000006.sdmp, main.dll.2.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              2.82.8.80
              unknownPortugal
              3243MEO-RESIDENCIALPTtrue
              70.160.67.203
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              75.143.236.149
              unknownUnited States
              20115CHARTER-20115UStrue
              83.110.223.61
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              86.195.14.72
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              84.215.202.8
              unknownNorway
              41164GET-NOGETNorwayNOtrue
              184.182.66.109
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              105.184.103.97
              unknownSouth Africa
              37457Telkom-InternetZAtrue
              92.186.69.229
              unknownFrance
              12479UNI2-ASEStrue
              174.4.89.3
              unknownCanada
              6327SHAWCAtrue
              161.142.103.187
              unknownMalaysia
              9930TTNET-MYTIMEdotComBerhadMYtrue
              114.143.176.236
              unknownIndia
              17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
              14.192.241.76
              unknownMalaysia
              9534MAXIS-AS1-APBinariangBerhadMYtrue
              173.88.135.179
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              84.108.200.161
              unknownIsrael
              8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILtrue
              47.34.30.133
              unknownUnited States
              20115CHARTER-20115UStrue
              183.87.163.165
              unknownIndia
              132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
              124.149.143.189
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              184.181.75.148
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              84.35.26.14
              unknownNetherlands
              21221INFOPACT-ASTheNetherlandsNLtrue
              73.29.92.128
              unknownUnited States
              7922COMCAST-7922UStrue
              68.203.69.96
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              82.131.141.209
              unknownHungary
              20845DIGICABLEHUtrue
              64.121.161.102
              unknownUnited States
              6079RCN-ASUStrue
              178.175.187.254
              unknownMoldova Republic of
              43289TRABIAMDtrue
              96.56.197.26
              unknownUnited States
              6128CABLE-NET-1UStrue
              186.64.67.30
              unknownArgentina
              27953NODOSUDSAARtrue
              188.28.19.84
              unknownUnited Kingdom
              206067H3GUKGBtrue
              125.99.76.102
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              81.101.185.146
              unknownUnited Kingdom
              5089NTLGBtrue
              86.176.144.234
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              59.28.84.65
              unknownKorea Republic of
              4766KIXS-AS-KRKoreaTelecomKRtrue
              76.86.31.59
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              147.147.30.126
              unknownUnited Kingdom
              6871PLUSNETUKInternetServiceProviderGBtrue
              96.87.28.170
              unknownUnited States
              7922COMCAST-7922UStrue
              75.109.111.89
              unknownUnited States
              19108SUDDENLINK-COMMUNICATIONSUStrue
              78.92.133.215
              unknownHungary
              5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUtrue
              124.122.47.148
              unknownThailand
              17552TRUE-AS-APTrueInternetCoLtdTHtrue
              88.126.94.4
              unknownFrance
              12322PROXADFRtrue
              51.14.29.227
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              85.57.212.13
              unknownSpain
              12479UNI2-ASEStrue
              47.205.25.170
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              95.45.50.93
              unknownIreland
              5466EIRCOMInternetHouseIEtrue
              80.12.88.148
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              81.111.108.123
              unknownUnited Kingdom
              5089NTLGBtrue
              69.133.162.35
              unknownUnited States
              11426TWC-11426-CAROLINASUStrue
              86.132.236.117
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              151.62.238.176
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              70.112.206.5
              unknownUnited States
              11427TWC-11427-TEXASUStrue
              41.228.224.161
              unknownTunisia
              37693TUNISIANATNtrue
              205.237.67.69
              unknownCanada
              11290CC-3272CAtrue
              102.159.188.125
              unknownTunisia
              37705TOPNETTNtrue
              151.65.167.77
              unknownItaly
              1267ASN-WINDTREIUNETEUtrue
              76.178.148.107
              unknownUnited States
              10838OCEANIC-INTERNET-RRUStrue
              89.36.206.69
              unknownItaly
              48544TECNOADSL-ASITtrue
              69.242.31.249
              unknownUnited States
              7922COMCAST-7922UStrue
              85.104.105.67
              unknownTurkey
              9121TTNETTRtrue
              94.207.104.225
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              193.253.100.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              76.16.49.134
              unknownUnited States
              7922COMCAST-7922UStrue
              201.244.108.183
              unknownColombia
              19429ETB-ColombiaCOtrue
              103.42.86.42
              unknownIndia
              133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
              78.18.105.11
              unknownIreland
              2110AS-BTIREBTIrelandwaspreviouslyknownasEsatNetEUnettrue
              80.6.50.34
              unknownUnited Kingdom
              5089NTLGBtrue
              103.144.201.56
              unknownunknown
              139762MSSOLUTION-AS-APSolutionBDtrue
              27.0.48.233
              unknownIndia
              132573SAINGN-AS-INSAINGNNetworkServicesINtrue
              70.28.50.223
              unknownCanada
              577BACOMCAtrue
              98.145.23.67
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              82.125.44.236
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              81.229.117.95
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              89.129.109.27
              unknownSpain
              12479UNI2-ASEStrue
              122.186.210.254
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              79.77.142.22
              unknownUnited Kingdom
              9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
              90.78.147.141
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              122.184.143.86
              unknownIndia
              9498BBIL-APBHARTIAirtelLtdINtrue
              186.75.95.6
              unknownPanama
              11556CableWirelessPanamaPAtrue
              50.68.186.195
              unknownCanada
              6327SHAWCAtrue
              12.172.173.82
              unknownUnited States
              2386INS-ASUStrue
              213.64.33.61
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              79.168.224.165
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              176.142.207.63
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              86.173.2.12
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              92.154.17.149
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              78.160.146.127
              unknownTurkey
              9121TTNETTRtrue
              58.186.75.42
              unknownViet Nam
              18403FPT-AS-APTheCorporationforFinancingPromotingTechnolotrue
              223.166.13.95
              unknownChina
              17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
              65.95.141.84
              unknownCanada
              577BACOMCAtrue
              50.68.204.71
              unknownCanada
              6327SHAWCAtrue
              71.38.155.217
              unknownUnited States
              209CENTURYLINK-US-LEGACY-QWESTUStrue
              220.240.164.182
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              103.123.223.133
              unknownIndia
              138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
              24.198.114.130
              unknownUnited States
              11351TWC-11351-NORTHEASTUStrue
              2.36.64.159
              unknownItaly
              30722VODAFONE-IT-ASNITtrue
              198.2.51.242
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              92.9.45.20
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              113.11.92.30
              unknownBangladesh
              7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
              109.50.149.241
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              69.119.123.159
              unknownUnited States
              6128CABLE-NET-1UStrue
              172.115.17.50
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              147.219.4.194
              unknownUnited States
              1498DNIC-ASBLK-01498-01499UStrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:878635
              Start date and time:2023-05-30 22:49:11 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 20s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:10
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:5q4psw.msi
              Detection:MAL
              Classification:mal96.troj.evad.winMSI@10/14@0/100
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 81%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, VSSVC.exe, svchost.exe
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtFsControlFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
              TimeTypeDescription
              22:49:56API Interceptor1627x Sleep call for process: msiexec.exe modified
              22:50:24API Interceptor21x Sleep call for process: rundll32.exe modified
              22:50:24API Interceptor206x Sleep call for process: wscript.exe modified
              22:50:26API Interceptor170x Sleep call for process: wermgr.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:modified
              Size (bytes):8650
              Entropy (8bit):5.542664536260259
              Encrypted:false
              SSDEEP:96:JrM26KeS3YqUTyyPw9CsAqnUTyyPw9C6jUzJU/Aq1HVP0BSxaGcciBoFj+vCUVp6:JlexTyOwg3TyOwgi1dRUVp6
              MD5:6CE8B30BD7FFE8CB9684B5ED6A3470DE
              SHA1:23ACE6CF9C76CFBB72A4A15DDCE2461C9E8230A4
              SHA-256:DF4366ECE40B234F7DDD38A2FFCBF0B9C0D21DF6E02F1CFE7E86B08D975698DB
              SHA-512:414EA03D2AD73A2FFB3DF195E458AD6DDDE7F952E7DB90779333183426AAF64A7258EB3F62BEFB3627A9A49D88ACAE66862834499A0EB507A1C64F8DDF641200
              Malicious:false
              Preview:...@IXOS.@.....@...V.@.....@.....@.....@.....@.....@......&.{2DB09FCD-7D8E-4C24-BF5D-FB5BD25D67B7}'.Adobe Acrobat PDF Browser Plugin 4.8.25..5q4psw.msi.@.....@.....@.....@........&.{D557C495-7A3E-4038-8369-B6EDCD5EFABE}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}&.{2DB09FCD-7D8E-4C24-BF5D-FB5BD25D67B7}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\....B.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll....D.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs....WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....%.Software\AdobeAcrobatPDFBrowserPlugin...@....(.&...AdobeAcrobatPDFBro
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):2984
              Entropy (8bit):3.6765846959388937
              Encrypted:false
              SSDEEP:48:i7Nhr1JzN38RN3x0/7wP8aZntCwL7feGp9bHfOIgbR1fOIgBKEBKRC6v6ReyZ:whr1JB4uU/vfHzbOHXOHB9BpiW
              MD5:AC8EE2E678671D2990AF13E9ED309F72
              SHA1:E5E6A81618D6218DF707212BA9E2141BE27A3186
              SHA-256:20716FE7E8B8ABFA2CA44309973CE9534B95DA9DD4576DB304421F514F5F17AB
              SHA-512:4C5F9163ACA63A378E7517457A13D7A363AF21124EEF39141B879A2D628A4B3F7A6E193B9AD417F87A2AE7ED65653D238AEC791BFBE1EB709DBEE3F8B4FBA51B
              Malicious:false
              Preview:.D.....M..,....c.g.t....................K..N.=N..5wU0..8........3..............M..0.<fK...; ...............................$.......8...2.......2...I.n.s.t.a.l.l.e.d. .A.d.o.b.e. .A.c.r.o.b.a.t. .P.D.F. .B.r.o.w.s.e.r. .P.l.u.g.i.n. .4...8...2.5...............C.:.\.W.i.n.d.o.w.s.\...............2.1.6.8.6.5.................W.O.R.K.G.R.O.U.P..........}.*.M..........................).(?..P............. ...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|.......%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .1.9...0.1.0...2.0.0.9.8.....).......)...A.d.o.b.e. .F.l.a.s.h. .P.l.a.y.e.r. .2.5. .A.c.t.i.v.e.X. .2.5...0...0...1.2.7.....'.......
              Process:C:\Windows\System32\msiexec.exe
              File Type:SysEx File - Twister
              Category:dropped
              Size (bytes):8733112
              Entropy (8bit):3.681615069579119
              Encrypted:false
              SSDEEP:12288:+8+YgOpYEzT4G09wYKc9rMjG/BWigr7dCKV0/HwLQt+Y/g4zsuAvm7gPI+PhgcIi:dljYY8BWitXZh7TeQsPIy1YQz
              MD5:0B6F6F2272DF0BF059F2EC14DDA9DADD
              SHA1:F1511D2A105AF4A2656ED256E911682544333A37
              SHA-256:950B15ECF1D3DFAFC56D902DA651E82DE8DAAFAE164A4974336C1CCCA62BDE9F
              SHA-512:417D99DCD572EA6EF93D54C0E0551B5688043D7B026C3F80BBF0E12EA3A3D53B06A56A246E1F5B171C711BC3ADE7773965F6E411AA0B916175AABD24216ED563
              Malicious:false
              Preview:.%..=..J.....>.(.}.............A...................... ...Y.......Y...<.B.A.C.K.U.P._.C.O.M.P.O.N.E.N.T.S. .x.m.l.n.s.=.".x.-.s.c.h.e.m.a.:.#.V.s.s.C.o.m.p.o.n.e.n.t.M.e.t.a.d.a.t.a.". .v.e.r.s.i.o.n.=.".1...2.". .b.o.o.t.a.b.l.e.S.y.s.t.e.m.S.t.a.t.e.B.a.c.k.u.p.=.".y.e.s.". .s.e.l.e.c.t.C.o.m.p.o.n.e.n.t.s.=.".y.e.s.". .b.a.c.k.u.p.T.y.p.e.=.".f.u.l.l.". .p.a.r.t.i.a.l.F.i.l.e.S.u.p.p.o.r.t.=.".y.e.s.". .s.n.a.p.s.h.o.t.S.e.t.I.d.=.".9.5.b.d.4.b.a.6.-.e.4.4.e.-.4.e.3.d.-.a.c.e.d.-.3.5.7.7.5.5.3.0.f.d.8.d.".>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.n.s.t.a.n.c.e.I.d.=.".4.5.8.b.f.6.d.0.-.9.8.7.c.-.4.5.2.7.-.b.7.b.9.-.5.d.4.0.5.2.4.a.2.1.2.4.". .w.r.i.t.e.r.I.d.=.".e.8.1.3.2.9.7.5.-.6.f.9.3.-.4.4.6.4.-.a.5.3.e.-.1.0.5.0.2.5.3.a.e.2.2.0.". .b.a.c.k.u.p.S.c.h.e.m.a.=.".0.".>.<.C.O.M.P.O.N.E.N.T. .c.o.m.p.o.n.e.n.t.N.a.m.e.=.".S.y.s.t.e.m. .F.i.l.e.s.". .c.o.m.p.o.n.e.n.t.T.y.p.e.=.".f.i.l.e.g.r.o.u.p."./.>.<./.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S.>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):2984
              Entropy (8bit):3.6765846959388937
              Encrypted:false
              SSDEEP:48:i7Nhr1JzN38RN3x0/7wP8aZntCwL7feGp9bHfOIgbR1fOIgBKEBKRC6v6ReyZ:whr1JB4uU/vfHzbOHXOHB9BpiW
              MD5:AC8EE2E678671D2990AF13E9ED309F72
              SHA1:E5E6A81618D6218DF707212BA9E2141BE27A3186
              SHA-256:20716FE7E8B8ABFA2CA44309973CE9534B95DA9DD4576DB304421F514F5F17AB
              SHA-512:4C5F9163ACA63A378E7517457A13D7A363AF21124EEF39141B879A2D628A4B3F7A6E193B9AD417F87A2AE7ED65653D238AEC791BFBE1EB709DBEE3F8B4FBA51B
              Malicious:false
              Preview:.D.....M..,....c.g.t....................K..N.=N..5wU0..8........3..............M..0.<fK...; ...............................$.......8...2.......2...I.n.s.t.a.l.l.e.d. .A.d.o.b.e. .A.c.r.o.b.a.t. .P.D.F. .B.r.o.w.s.e.r. .P.l.u.g.i.n. .4...8...2.5...............C.:.\.W.i.n.d.o.w.s.\...............2.1.6.8.6.5.................W.O.R.K.G.R.O.U.P..........}.*.M..........................).(?..P............. ...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|.......%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .1.9...0.1.0...2.0.0.9.8.....).......)...A.d.o.b.e. .F.l.a.s.h. .P.l.a.y.e.r. .2.5. .A.c.t.i.v.e.X. .2.5...0...0...1.2.7.....'.......
              Process:C:\Windows\System32\msiexec.exe
              File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):952832
              Entropy (8bit):6.765764209638377
              Encrypted:false
              SSDEEP:24576:UkgLxg2eMP8EN8Vo7zgDQ9uo4iZSBi/u3wXqx9jKVM5qx0YJ:x/jDQMo49wpq
              MD5:0C8E5B12B177A199008B2282C7506FFF
              SHA1:0DFEE8BAE7073512F8BFDABAF0C0B7C882B3864E
              SHA-256:9A407A2F0BA3C0E3BA3CFA2FFD6472DB3BC572B8EF08F1FBA7139CBD36CC8DCA
              SHA-512:6464EC42CCCB85E7C067AD9F7C8B804D064A6974E8184BC5134436FAD004BF87630869C107BB91F87BDC59F7938A8A157F59A436CE0265C070DB32A54C4541B5
              Malicious:false
              Antivirus:
              • Antivirus: Virustotal, Detection: 4%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..d...........#...8...................................................... ...........@... .........................hC......<............................ ...?..........................$J.......................................................text...4...........................`.0`.data...............................@.0..rdata..|...........................@.0@.bss....D....p.......>................0..edata..hC.......D...>..............@.0@.idata..<...........................@.0..CRT....0...........................@.0..tls................................@.0..rsrc...b...........................@.0..reloc...?.......@...J..............@.0B................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):132
              Entropy (8bit):4.599233980549996
              Encrypted:false
              SSDEEP:3:LwBxFkvH4dGmMKLVKRLGPz4VAFkvH4dGmMKLVKRLGH:cHFkvYdlZKRLi7FkvYdlZKRL4
              MD5:0D4C9F15CE74465C59AE36A27F98C817
              SHA1:9CCE8EEFA4D3D9C5E161C5DBB860CFE1489C6B1A
              SHA-256:D24E3399060B51F3A1C9D41A67DE2601888A35C99DA8DB70070D757BB3F1913A
              SHA-512:9BED0EAFC2CF2A2360850CA1070FFB04AC14F04C78379485998A93F45012B5C11CC7F6F68129F65B8B5F90437CB965908C6A1BB9D83A56B068D6BDE1D5FDAD1F
              Malicious:false
              Preview:MsgBox "Adobe Acrobat PDF Browser Plugin installation error 0x00000328", 16, "Adobe Acrobat PDF Browser Plugin installation error"..
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):69632
              Entropy (8bit):0.12106622410839882
              Encrypted:false
              SSDEEP:24:IUM7E818lOdWmDqqrb9ipVIdWmDqqrb9ipV7VIwGblrkg/+XJb:D5818lEOMSoOMS5Er/A
              MD5:7F93A52E440F4EAED2C4D1B2B4228C6E
              SHA1:66F146E9B131E8B3EB8A2BE4BCC48A719AF682DF
              SHA-256:3EEA36DA85DC276A4BB1EE35DCAEEACD5E768ABF84B6104C900C5E8F7007B1FE
              SHA-512:45CA91C3AD0C7E78912E282169838C3AB544356B1A5F06163ED0FB6DD9550D5C21B6964F6398053F438DF49D9485FA81CB97630134F24AB83D4BAF1E66ED21F5
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):0.06981105571250576
              Encrypted:false
              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOSlgOda8971N5QVky6lS:2F0i8n0itFzDHFSiOdbFS
              MD5:5958014AA25C5536AC922FB0F2586B9F
              SHA1:AE9F32F875238BDDEA22C343217DF64FB74AFE59
              SHA-256:D4E0FBF5B4E51B6A1076DFBE9B346D390714A0F796BC73C9D2CB187793961966
              SHA-512:DF3C3E2E61AB5EAB0C4A5CCEC40A07F9E3491CE7C0D6C4A74D476ADD9179A6494963789898DCD7E5741BCD9437B01E4D333F08729EAFDB37220BEB3647C0B73A
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {D557C495-7A3E-4038-8369-B6EDCD5EFABE}, Create Time/Date: Tue May 30 14:26:08 2023, Last Saved Time/Date: Tue May 30 14:26:08 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):507904
              Entropy (8bit):7.919619627017417
              Encrypted:false
              SSDEEP:12288:wn+NgINNEcfjVRMigNFoILI8KviLjvhAol71Q:wnX9gjVRMDqH8fL154
              MD5:E35727B10193FE55DF216A1F9D166997
              SHA1:9DDAFA77FC9FDEA0085E41AA0F3A1EE0D15D9C8A
              SHA-256:696156D9A4117CBA652B18B012DB376FDDFBD7DB8B26A638C760D61B98D3590D
              SHA-512:2BBA74B0B7F5EE8509310030BB45DEF13B87394E55EDF8D0E51595D6CC669F4B2C7497D95331C09C9F7B453F3C9ACDEB03E41CD5E5DC14F9ECB9DD9F79D7AD8D
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.5270036864906151
              Encrypted:false
              SSDEEP:24:JKFC/lym6cpmUHCAjvuSTQJj+rdWmDqqrb9ipV7VIwGblrkgsdWmDqqrb9ipVi8R:E0+cDHBvuOauOMS5ErmOMSI818lI
              MD5:7B5B369F167CD164FFD9B8C6C5539E2F
              SHA1:B529F5853F3DB7C99443E293AD19554A5CC84C18
              SHA-256:56115F36679BAC14B426F657F2DA5514E2F0AC2346860FDF9C1BA1BAB8EBAED8
              SHA-512:84065ECA2463FC890B172EA204454435DDF862F7631E42263F952566511C990B7CEEA58DCEC63586EE8542ED2EAE26FDD52E918ECCF994F4859F3A493ECCE7D9
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {D557C495-7A3E-4038-8369-B6EDCD5EFABE}, Create Time/Date: Tue May 30 14:26:08 2023, Last Saved Time/Date: Tue May 30 14:26:08 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Category:dropped
              Size (bytes):507904
              Entropy (8bit):7.919619627017417
              Encrypted:false
              SSDEEP:12288:wn+NgINNEcfjVRMigNFoILI8KviLjvhAol71Q:wnX9gjVRMDqH8fL154
              MD5:E35727B10193FE55DF216A1F9D166997
              SHA1:9DDAFA77FC9FDEA0085E41AA0F3A1EE0D15D9C8A
              SHA-256:696156D9A4117CBA652B18B012DB376FDDFBD7DB8B26A638C760D61B98D3590D
              SHA-512:2BBA74B0B7F5EE8509310030BB45DEF13B87394E55EDF8D0E51595D6CC669F4B2C7497D95331C09C9F7B453F3C9ACDEB03E41CD5E5DC14F9ECB9DD9F79D7AD8D
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\msiexec.exe
              File Type:data
              Category:dropped
              Size (bytes):2138
              Entropy (8bit):5.591360062877065
              Encrypted:false
              SSDEEP:48:YWozIAJwCP3NDufg7YjRBoD8SY1eU/dnMhaEVltgI4ta:YrMizYjrAuei8aEPNr
              MD5:20E0FCD7F06ADA3EB0A4D114A59A3827
              SHA1:7A633819C34AF72788899ACF1866DE1AAEC33798
              SHA-256:11DDB4D087D3498DE2F22DCE503B778BCEED800DCF52F6BCAA723D7969EC1C12
              SHA-512:4A537A0C8132A3C6DEFA89319DFFD350F10891E4A3C92004AC5590BDF4E1BAACF9660B34F37B5E394800A25EF4DCCE6A64C6B878B393F87CED90D159E8BB6E68
              Malicious:false
              Preview:...@IXOS.@.....@...V.@.....@.....@.....@.....@.....@......&.{2DB09FCD-7D8E-4C24-BF5D-FB5BD25D67B7}'.Adobe Acrobat PDF Browser Plugin 4.8.25..5q4psw.msi.@.....@.....@.....@........&.{D557C495-7A3E-4038-8369-B6EDCD5EFABE}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}F.01:\Software\AdobeAcrobatPDFBrowserPlugin\AdobeAcrobatPDFBrowserPlugin.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@......:.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\..).1\xssanpen\|AdobeAcrobatPDFBrowserPlugin\......Please insert the disk: ..media3.cab.@.....@......C:\Windows\Installer\66172a.msi.........@........main.dll..dll_main..main.dll.@.....@.....@.......@...
              Process:C:\Windows\System32\msiexec.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):1.1633152870579164
              Encrypted:false
              SSDEEP:12:JSbX72FjjAGiLIlHVRpth/7777777777777777777777777vDHFSiOdbEpSl0i8Q:JRQI5pidyF
              MD5:511E527D4026F33946CCBFCA96C5CFAE
              SHA1:9FC6F019853ED4F0FD57720329B2A77407CFA303
              SHA-256:87B237324E922DEB42A9528790975F754EC03C9BA6DCED8A0C96177FE9DF9914
              SHA-512:1A88BCB05D17A6F88C811AC899CF2A111B988CB325FD098B8370BCBA3B0F549F48F759AF2939954CC4C64EEC958328C56374A4D7A4FCF0DAD4BC1564A1C1AE7C
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {D557C495-7A3E-4038-8369-B6EDCD5EFABE}, Create Time/Date: Tue May 30 14:26:08 2023, Last Saved Time/Date: Tue May 30 14:26:08 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
              Entropy (8bit):7.919619627017417
              TrID:
              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
              File name:5q4psw.msi
              File size:507904
              MD5:e35727b10193fe55df216a1f9d166997
              SHA1:9ddafa77fc9fdea0085e41aa0f3a1ee0d15d9c8a
              SHA256:696156d9a4117cba652b18b012db376fddfbd7db8b26a638c760d61b98d3590d
              SHA512:2bba74b0b7f5ee8509310030bb45def13b87394e55edf8d0e51595d6cc669f4b2c7497d95331c09c9f7b453f3c9acdeb03e41cd5e5dc14f9ecb9dd9f79d7ad8d
              SSDEEP:12288:wn+NgINNEcfjVRMigNFoILI8KviLjvhAol71Q:wnX9gjVRMDqH8fL154
              TLSH:DDB423597606A371C4C82A72A63F77CAB6B17CA547074833C33FB2DE0D3657829267A1
              File Content Preview:........................>......................................................................................................................................................................................................................................
              Icon Hash:2d2e3797b32b2b99
              No network behavior found

              Click to jump to process

              Target ID:1
              Start time:22:49:56
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\5q4psw.msi"
              Imagebase:0xff020000
              File size:128512 bytes
              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:2
              Start time:22:49:57
              Start date:30/05/2023
              Path:C:\Windows\System32\msiexec.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\msiexec.exe /V
              Imagebase:0xff020000
              File size:128512 bytes
              MD5 hash:AC2E7152124CEED36846BD1B6592A00F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Target ID:5
              Start time:22:50:24
              Start date:30/05/2023
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0xfff50000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:22:50:24
              Start date:30/05/2023
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
              Imagebase:0xff070000
              File size:168960 bytes
              MD5 hash:045451FA238A75305CC26AC982472367
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:22:50:24
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
              Imagebase:0x230000
              File size:44544 bytes
              MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.1048899180.000000000257D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.1048686575.000000000038D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:high

              Target ID:9
              Start time:22:50:26
              Start date:30/05/2023
              Path:C:\Windows\SysWOW64\wermgr.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\wermgr.exe
              Imagebase:0x6e0000
              File size:53760 bytes
              MD5 hash:C9905EA4C326DAB778B9297BA5BD1889
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              No disassembly