Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
F072.dll

Overview

General Information

Sample Name:F072.dll
Analysis ID:878698
MD5:0f25933ea364d051e10480e68cbf4ae7
SHA1:bcc95a67d10b389e7c58159911ceac3ba92bef0b
SHA256:f2e4cbb34cd7431ceb5a186fddd3b38736e5e327afff8dff5d87fe4a6a64048f
Tags:dllqbot
Infos:

Detection

Qbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Antivirus / Scanner detection for submitted sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Potentially malicious time measurement code found
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Found evasive API chain (date check)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4332 cmdline: loaddll32.exe "C:\Users\user\Desktop\F072.dll" MD5: 3B4636AE519868037940CA5C4272091B)
    • conhost.exe (PID: 2528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5268 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F072.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5236 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 6832 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5240 cmdline: rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_i MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6812 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5240 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7020 cmdline: rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_q MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5708 cmdline: rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_stable MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5696 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5708 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 4732 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_i MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5704 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 4708 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_q MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4696 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_stable MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 2872 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5400 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",next MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • wermgr.exe (PID: 6828 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: CCF15E662ED5CE77B5FF1A7AAE305233)
    • rundll32.exe (PID: 5388 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_license MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5636 cmdline: rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_configuration MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "BB30", "Campaign": "1685433861", "Version": "404.1320", "C2 list": ["12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.186.128.181:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078", "12.172.173.82:995", "77.86.98.236:443", "104.35.24.154:443", "213.64.33.61:2222", "47.149.134.231:443", "72.134.124.16:443", "47.34.30.133:443", "103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "188.28.19.84:443", "174.58.146.57:443", "94.207.104.225:443", "86.97.55.89:2222", "69.123.4.221:2222"]}
SourceRuleDescriptionAuthorStrings
00000011.00000002.418718397.0000000004980000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000011.00000002.418554458.0000000002C3A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        17.2.rundll32.exe.4940000.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        17.2.rundll32.exe.4940000.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          17.2.rundll32.exe.2c51168.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xdf71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0x9b97:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          17.2.rundll32.exe.2c51168.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            17.2.rundll32.exe.2c51168.0.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xeb71:$params: 8B 7D 08 8B F1 57 89 55 FC E8 A0 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa797:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000011.00000002.418554458.0000000002C3A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685433861", "Version": "404.1320", "C2 list": ["12.172.173.82:50001", "178.175.187.254:443", "65.95.141.84:2222", "205.237.67.69:995", "83.110.223.61:443", "193.253.100.236:2222", "27.0.48.233:443", "102.159.188.125:443", "71.38.155.217:443", "58.186.75.42:443", "76.178.148.107:2222", "70.28.50.223:2087", "114.143.176.236:443", "51.14.29.227:2222", "59.28.84.65:443", "173.88.135.179:443", "103.144.201.56:2078", "96.87.28.170:2222", "105.186.128.181:995", "176.142.207.63:443", "151.62.238.176:443", "12.172.173.82:32101", "122.186.210.254:443", "82.125.44.236:2222", "84.108.200.161:443", "76.16.49.134:443", "70.28.50.223:32100", "12.172.173.82:465", "76.170.252.153:995", "184.182.66.109:443", "78.92.133.215:443", "50.68.204.71:993", "186.75.95.6:443", "113.11.92.30:443", "70.28.50.223:3389", "98.145.23.67:443", "85.57.212.13:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "69.242.31.249:443", "81.101.185.146:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "86.195.14.72:2222", "81.229.117.95:2222", "220.240.164.182:443", "73.29.92.128:443", "12.172.173.82:21", "96.56.197.26:2222", "75.109.111.89:443", "76.86.31.59:443", "201.244.108.183:995", "68.203.69.96:443", "124.122.47.148:443", "122.184.143.86:443", "92.186.69.229:2222", "70.28.50.223:2083", "89.129.109.27:2222", "147.147.30.126:2222", "125.99.76.102:443", "88.126.94.4:50000", "151.65.167.77:443", "86.132.236.117:443", "92.154.17.149:2222", "223.166.13.95:995", "89.36.206.69:995", "96.56.197.26:2083", "78.18.105.11:443", "82.127.153.75:2222", "90.78.147.141:2222", "82.131.141.209:443", "183.87.163.165:443", "92.9.45.20:2222", "80.6.50.34:443", "80.12.88.148:2222", "69.133.162.35:443", "172.115.17.50:443", "95.45.50.93:2222", "12.172.173.82:2087", "103.140.174.20:2222", "24.198.114.130:995", "50.68.204.71:443", "69.119.123.159:2222", "64.121.161.102:443", "2.82.8.80:443", "184.181.75.148:443", "70.112.206.5:443", "198.2.51.242:993", "2.36.64.159:2078", "79.77.142.22:2222", "84.215.202.8:443", "147.219.4.194:443", "116.74.164.81:443", "70.28.50.223:2078", "12.172.173.82:995", "77.86.98.236:443", "104.35.24.154:443", "213.64.33.61:2222", "47.149.134.231:443", "72.134.124.16:443", "47.34.30.133:443", "103.42.86.42:995", "174.4.89.3:443", "161.142.103.187:995", "78.160.146.127:443", "84.35.26.14:995", "12.172.173.82:20", "70.28.50.223:2078", "124.149.143.189:2222", "70.160.67.203:443", "186.64.67.30:443", "103.123.223.133:443", "188.28.19.84:443", "174.58.146.57:443", "94.207.104.225:443", "86.97.55.89:2222", "69.123.4.221:2222"]}
            Source: F072.dllAvira: detected
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: netstat -nao
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: runas
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ipconfig /all
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: net localgroup
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Microsoft
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELF_TEST_1
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: p%08x
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Self test FAILED!!!
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Self test OK.
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: /t5
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: whoami /all
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: cmd
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: route print
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .lnk
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: arp -a
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: net share
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: cmd.exe /c set
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Self check
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %u;%u;%u;
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ProfileImagePath
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ProgramData
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Self check ok!
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: powershell.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: qwinsta
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: net view
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Component_08
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Start screenshot
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: appidapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: c:\ProgramData
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Component_07
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: powershell.exe -encodedCommand
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: netstat -nao
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: runas
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ipconfig /all
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SystemRoot
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: cscript.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: image/jpeg
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: LocalLow
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: displayName
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: shlwapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CommandLine
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: kernel32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: 1234567890
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wbj.go
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_DiskDrive
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: System32
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Name
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: WRSA.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: c:\\
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SpyNetReporting
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: FALSE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aswhookx.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Packages
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: RepUx.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Winsta0
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: root\SecurityCenter2
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: MsMpEng.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: userenv.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: csc_ui.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: \\.\pipe\
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: pstorec.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: NTUSER.DAT
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: from
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: netapi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: gdi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: setupapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: iphlpapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CrAmTray.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: user32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: \sf2.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Software\Microsoft
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %S.%06d
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: bcrypt.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wtsapi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: shell32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: TRUE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_Bios
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: */*
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ByteFence.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: type=0x%04X
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ROOT\CIMV2
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: https
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: fshoster32.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: kernelbase.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: regsvr32.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %s\system32\
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_Process
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: rundll32.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: LOCALAPPDATA
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: cmd.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: APPDATA
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: select
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: mcshield.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: advapi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ws2_32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .cfg
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_Product
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: WQL
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wininet.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: LastBootUpTime
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: urlmon.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Create
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_PnPEntity
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Initializing database...
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: winsta0\default
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .dat
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: WBJ_IGNORE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: next
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wpcap.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: image/pjpeg
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: fmon.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: vbs
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aswhooka.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SysWOW64
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: mpr.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: image/gif
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: crypt32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ntdll.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: open
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SystemRoot
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: cscript.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: image/jpeg
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: LocalLow
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: displayName
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: shlwapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CommandLine
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: kernel32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: 1234567890
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wbj.go
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_DiskDrive
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: System32
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Name
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: WRSA.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: c:\\
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SpyNetReporting
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: FALSE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aswhookx.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Packages
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: RepUx.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Winsta0
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: root\SecurityCenter2
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: MsMpEng.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: userenv.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: csc_ui.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: \\.\pipe\
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: pstorec.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: NTUSER.DAT
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: from
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: netapi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: gdi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: setupapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: iphlpapi.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CrAmTray.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: user32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: \sf2.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Software\Microsoft
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %S.%06d
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: bcrypt.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wtsapi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: shell32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: TRUE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_Bios
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: */*
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ByteFence.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: type=0x%04X
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ROOT\CIMV2
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: https
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: fshoster32.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: kernelbase.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: regsvr32.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %s\system32\
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_Process
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: rundll32.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: LOCALAPPDATA
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: cmd.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: APPDATA
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: select
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: mcshield.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: advapi32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ws2_32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .cfg
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_Product
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: WQL
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wininet.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: LastBootUpTime
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: urlmon.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Create
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Win32_PnPEntity
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Initializing database...
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: winsta0\default
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: .dat
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: WBJ_IGNORE
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: next
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: wpcap.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: image/pjpeg
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: fmon.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: vbs
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: aswhooka.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: SysWOW64
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: mpr.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: image/gif
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: crypt32.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: ntdll.dll
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: open
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 17.2.rundll32.exe.4940000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035030 mv_get_random_seed,BCryptOpenAlgorithmProvider,BCryptGenRandom,BCryptCloseAlgorithmProvider,mvpriv_open,_read,_close,mvpriv_open,_read,_close,clock,clock,mv_sha_init,mv_sha_update,mv_sha_final,mv_log,abort,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000C0B0 mv_cast5_crypt2,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B0D0 mv_camellia_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013100 mv_encryption_init_info_alloc,mv_mallocz,mv_mallocz,mv_mallocz,mv_mallocz,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_calloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000C1B0 mv_cast5_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100132D0 mv_encryption_init_info_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10002480 mv_aes_ctr_crypt,mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013480 mv_encryption_init_info_get_side_data,mv_encryption_init_info_alloc,mv_free,mv_free,mv_free,mv_free,mv_free,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100084B0 mv_blowfish_crypt,mv_blowfish_crypt_ecb,mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10002523 mv_aes_crypt,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001363B mv_encryption_init_info_alloc,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000867B mv_blowfish_crypt_ecb,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100136FB mv_encryption_init_info_alloc,
            Source: F072.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
            Source: unknownHTTPS traffic detected: 68.87.41.40:443 -> 192.168.2.5:49731 version: TLS 1.2
            Source: F072.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04949DA8 FindFirstFileW,FindNextFileW,

            Networking

            barindex
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 178.175.187.254:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 205.237.67.69:995
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 193.253.100.236:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 102.159.188.125:443
            Source: Malware configuration extractorIPs: 71.38.155.217:443
            Source: Malware configuration extractorIPs: 58.186.75.42:443
            Source: Malware configuration extractorIPs: 76.178.148.107:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 51.14.29.227:2222
            Source: Malware configuration extractorIPs: 59.28.84.65:443
            Source: Malware configuration extractorIPs: 173.88.135.179:443
            Source: Malware configuration extractorIPs: 103.144.201.56:2078
            Source: Malware configuration extractorIPs: 96.87.28.170:2222
            Source: Malware configuration extractorIPs: 105.186.128.181:995
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 151.62.238.176:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 122.186.210.254:443
            Source: Malware configuration extractorIPs: 82.125.44.236:2222
            Source: Malware configuration extractorIPs: 84.108.200.161:443
            Source: Malware configuration extractorIPs: 76.16.49.134:443
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 76.170.252.153:995
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 78.92.133.215:443
            Source: Malware configuration extractorIPs: 50.68.204.71:993
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 98.145.23.67:443
            Source: Malware configuration extractorIPs: 85.57.212.13:3389
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 69.242.31.249:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 75.143.236.149:443
            Source: Malware configuration extractorIPs: 14.192.241.76:995
            Source: Malware configuration extractorIPs: 86.195.14.72:2222
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 220.240.164.182:443
            Source: Malware configuration extractorIPs: 73.29.92.128:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 76.86.31.59:443
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 68.203.69.96:443
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 122.184.143.86:443
            Source: Malware configuration extractorIPs: 92.186.69.229:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 89.129.109.27:2222
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 151.65.167.77:443
            Source: Malware configuration extractorIPs: 86.132.236.117:443
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 89.36.206.69:995
            Source: Malware configuration extractorIPs: 96.56.197.26:2083
            Source: Malware configuration extractorIPs: 78.18.105.11:443
            Source: Malware configuration extractorIPs: 82.127.153.75:2222
            Source: Malware configuration extractorIPs: 90.78.147.141:2222
            Source: Malware configuration extractorIPs: 82.131.141.209:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 80.12.88.148:2222
            Source: Malware configuration extractorIPs: 69.133.162.35:443
            Source: Malware configuration extractorIPs: 172.115.17.50:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 24.198.114.130:995
            Source: Malware configuration extractorIPs: 50.68.204.71:443
            Source: Malware configuration extractorIPs: 69.119.123.159:2222
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 70.112.206.5:443
            Source: Malware configuration extractorIPs: 198.2.51.242:993
            Source: Malware configuration extractorIPs: 2.36.64.159:2078
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 147.219.4.194:443
            Source: Malware configuration extractorIPs: 116.74.164.81:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 12.172.173.82:995
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 104.35.24.154:443
            Source: Malware configuration extractorIPs: 213.64.33.61:2222
            Source: Malware configuration extractorIPs: 47.149.134.231:443
            Source: Malware configuration extractorIPs: 72.134.124.16:443
            Source: Malware configuration extractorIPs: 47.34.30.133:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 78.160.146.127:443
            Source: Malware configuration extractorIPs: 84.35.26.14:995
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 124.149.143.189:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 186.64.67.30:443
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 174.58.146.57:443
            Source: Malware configuration extractorIPs: 94.207.104.225:443
            Source: Malware configuration extractorIPs: 86.97.55.89:2222
            Source: Malware configuration extractorIPs: 69.123.4.221:2222
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewASN Name: ASN-CXA-ALL-CCI-22773-RDCUS ASN-CXA-ALL-CCI-22773-RDCUS
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cacheCookie: xpgn=1
            Source: global trafficTCP traffic: 192.168.2.5:49748 -> 85.57.212.13:3389
            Source: unknownNetwork traffic detected: IP country count 30
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 124.122.47.148
            Source: unknownTCP traffic detected without corresponding DNS query: 85.57.212.13
            Source: unknownTCP traffic detected without corresponding DNS query: 85.57.212.13
            Source: unknownTCP traffic detected without corresponding DNS query: 85.57.212.13
            Source: unknownTCP traffic detected without corresponding DNS query: 85.57.212.13
            Source: unknownTCP traffic detected without corresponding DNS query: 85.57.212.13
            Source: national[1].htm.24.drString found in binary or memory: Find tutorials and demos\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca rel=\"nofollow\" href=\"https:\u002F\u002Fwww.facebook.com\u002Fxfinity\"\u003EFacebook equals www.facebook.com (Facebook)
            Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
            Source: rundll32.exe, rundll32.exe, 00000003.00000002.399203507.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.399211143.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.407006224.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.414998004.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.414998450.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.419061010.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, F072.dllString found in binary or memory: https://streams.videolan.org/upload/
            Source: national[1].htm.24.drString found in binary or memory: https://www.xfinity.com/learn/internet-service/acp
            Source: national[1].htm.24.drString found in binary or memory: https://www.xfinity.com/mobile/policies/broadband-disclosures
            Source: national[1].htm.24.drString found in binary or memory: https://www.xfinity.com/networkmanagement
            Source: unknownDNS traffic detected: queries for: xfinity.com
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cacheCookie: xpgn=1
            Source: unknownHTTPS traffic detected: 68.87.41.40:443 -> 192.168.2.5:49731 version: TLS 1.2
            Source: loaddll32.exe, 00000000.00000002.409804519.000000000123B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: F072.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
            Source: 17.2.rundll32.exe.4940000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 17.2.rundll32.exe.2c51168.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 17.2.rundll32.exe.2c51168.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 664
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D060
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10028070
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002B0AB
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B0D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10008144
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002A1A1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100101D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001021B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10027220
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10007270
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10024280
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002334C
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100353B0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100243C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013480
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1004C4C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D4D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001F523
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100105C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100215D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000164B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100206A7
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10010750
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000E760
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10010778
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002A800
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_049571FF
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04958D30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0495320D
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04943A40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04956E40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04954A6F
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494A412 NtAllocateVirtualMemory,NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494A823 GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494CA0F NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,NtFreeVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_049543F4 NtProtectVirtualMemory,NtProtectVirtualMemory,
            Source: F072.dllBinary or memory string: OriginalFilenameavutil-lav-57.dll. vs F072.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: fwpuclnt.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: schannel.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: mskeyprotect.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ncrypt.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ntasn1.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ncryptsslp.dll
            Source: F072.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\F072.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_i
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 664
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5240 -s 664
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_q
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_stable
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5708 -s 652
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_q
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_stable
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_license
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_configuration
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_q
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_stable
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_i
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_q
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_stable
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_license
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_configuration
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\wermgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Ixayi
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF92.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winDLL@31/23@2/100
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494D213 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494C71C CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_i
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5240
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{26CAAE63-F26A-4151-91F8-5B190E00B3CB}
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5708
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2528:120:WilError_01
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5236
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4696
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4732
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{E98255E4-990A-4ADC-9ACC-3D92A2E78CDC}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{26CAAE63-F26A-4151-91F8-5B190E00B3CB}
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: F072.dllStatic PE information: More than 582 > 100 exports found
            Source: F072.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001F523 mv_dict_get,LoadLibraryA,LoadLibraryA,InitOnceBeginInitialize,InitOnceComplete,LoadLibraryA,GetProcAddress,mv_log,atoi,mv_log,mv_log,GetProcAddress,
            Source: F072.dllStatic PE information: real checksum: 0xf1b7b should be: 0xf2fd9

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6828 base: 1093C50 value: E9 63 D7 69 FF
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 5392Thread sleep count: 181 > 30
            Source: C:\Windows\SysWOW64\wermgr.exe TID: 6848Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035030 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494B883 GetSystemInfo,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04949DA8 FindFirstFileW,FindNextFileW,
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
            Source: Amcache.hve.8.drBinary or memory string: VMware
            Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: Amcache.hve.8.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
            Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.8.drBinary or memory string: VMware7,1
            Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.me
            Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.8.drBinary or memory string: VMware-42 35 bb 32 33 75 d2 27-52 00 3c e2 4b d4 32 71
            Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.18227214.B64.2106252220,BiosReleaseDate:06/25/2021,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1g

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035030 Start: 10035315 End: 1003515E
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001F523 mv_dict_get,LoadLibraryA,LoadLibraryA,InitOnceBeginInitialize,InitOnceComplete,LoadLibraryA,GetProcAddress,mv_log,atoi,mv_log,mv_log,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035030 rdtsc
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001E0D9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_3_046B2297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04941015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_049421CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 760000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 730000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 1093C50
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 730000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 760000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 730000 value starts with: 4D5A
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494C2D1 GetSystemTimeAsFileTime,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10092180 GetTimeZoneInformation,GetModuleHandleA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0494BB4D GetCurrentProcessId,GetLastError,GetVersionExA,GetWindowsDirectoryW,
            Source: rundll32.exe, 00000011.00000003.409796816.00000000049FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: rundll32.exe, 00000011.00000003.409796816.00000000049FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
            Source: rundll32.exe, 00000011.00000003.409796816.00000000049FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: rundll32.exe, 00000011.00000003.409796816.00000000049FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
            Source: rundll32.exe, 00000011.00000003.409796816.00000000049FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: rundll32.exe, 00000011.00000003.409796816.00000000049FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 17.2.rundll32.exe.4940000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.rundll32.exe.2c51168.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.rundll32.exe.2c51168.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000011.00000002.418718397.0000000004980000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.418554458.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 17.2.rundll32.exe.4940000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.rundll32.exe.2c51168.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.rundll32.exe.2c51168.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000011.00000002.418718397.0000000004980000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.418554458.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts3
            Native API
            1
            DLL Side-Loading
            311
            Process Injection
            1
            Masquerading
            1
            Credential API Hooking
            2
            System Time Discovery
            Remote Services1
            Credential API Hooking
            Exfiltration Over Other Network Medium21
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            21
            Virtualization/Sandbox Evasion
            1
            Input Capture
            31
            Security Software Discovery
            Remote Desktop Protocol1
            Input Capture
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)311
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Archive Collected Data
            Automated Exfiltration1
            Ingress Tool Transfer
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Rundll32
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size Limits113
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync14
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878698 Sample: F072.dll Startdate: 31/05/2023 Architecture: WINDOWS Score: 100 35 2.36.64.159 VODAFONE-IT-ASNIT Italy 2->35 37 89.129.109.27 UNI2-ASES Spain 2->37 39 94 other IPs or domains 2->39 49 Found malware configuration 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 53 Yara detected Qbot 2->53 55 2 other signatures 2->55 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 rundll32.exe 9->14         started        16 cmd.exe 1 9->16         started        18 8 other processes 9->18 signatures6 57 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->57 59 Writes to foreign memory regions 11->59 61 Allocates memory in foreign processes 11->61 63 Injects a PE file into a foreign processes 11->63 20 wermgr.exe 11->20         started        65 Potentially malicious time measurement code found 14->65 23 WerFault.exe 3 9 14->23         started        25 rundll32.exe 16->25         started        27 WerFault.exe 18->27         started        29 WerFault.exe 2 9 18->29         started        31 WerFault.exe 9 18->31         started        process7 dnsIp8 41 85.57.212.13, 3389 UNI2-ASES Spain 20->41 43 124.122.47.148, 443, 49736, 49737 TRUE-AS-APTrueInternetCoLtdTH Thailand 20->43 47 2 other IPs or domains 20->47 33 WerFault.exe 20 9 25->33         started        45 192.168.2.1 unknown unknown 27->45 process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            F072.dll3%ReversingLabsWin32.Malware.Generic
            F072.dll6%VirustotalBrowse
            F072.dll100%AviraHEUR/AGEN.1363694
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            xfinity.com
            68.87.41.40
            truefalse
              high
              www.xfinity.com
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://xfinity.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.xfinity.com/mobile/policies/broadband-disclosuresnational[1].htm.24.drfalse
                    high
                    http://upx.sf.netAmcache.hve.8.drfalse
                      high
                      https://www.xfinity.com/learn/internet-service/acpnational[1].htm.24.drfalse
                        high
                        https://www.xfinity.com/networkmanagementnational[1].htm.24.drfalse
                          high
                          https://streams.videolan.org/upload/rundll32.exe, rundll32.exe, 00000003.00000002.399203507.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.399211143.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.407006224.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.414998004.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.414998450.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.419061010.00000000100AE000.00000002.00000001.01000000.00000003.sdmp, F072.dllfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            2.82.8.80
                            unknownPortugal
                            3243MEO-RESIDENCIALPTtrue
                            70.160.67.203
                            unknownUnited States
                            22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                            75.143.236.149
                            unknownUnited States
                            20115CHARTER-20115UStrue
                            83.110.223.61
                            unknownUnited Arab Emirates
                            5384EMIRATES-INTERNETEmiratesInternetAEtrue
                            86.195.14.72
                            unknownFrance
                            3215FranceTelecom-OrangeFRtrue
                            84.215.202.8
                            unknownNorway
                            41164GET-NOGETNorwayNOtrue
                            184.182.66.109
                            unknownUnited States
                            22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                            92.186.69.229
                            unknownFrance
                            12479UNI2-ASEStrue
                            174.4.89.3
                            unknownCanada
                            6327SHAWCAtrue
                            161.142.103.187
                            unknownMalaysia
                            9930TTNET-MYTIMEdotComBerhadMYtrue
                            114.143.176.236
                            unknownIndia
                            17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
                            14.192.241.76
                            unknownMalaysia
                            9534MAXIS-AS1-APBinariangBerhadMYtrue
                            173.88.135.179
                            unknownUnited States
                            10796TWC-10796-MIDWESTUStrue
                            84.108.200.161
                            unknownIsrael
                            8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILtrue
                            47.34.30.133
                            unknownUnited States
                            20115CHARTER-20115UStrue
                            183.87.163.165
                            unknownIndia
                            132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
                            184.181.75.148
                            unknownUnited States
                            22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                            124.149.143.189
                            unknownAustralia
                            7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
                            84.35.26.14
                            unknownNetherlands
                            21221INFOPACT-ASTheNetherlandsNLtrue
                            73.29.92.128
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            68.203.69.96
                            unknownUnited States
                            11427TWC-11427-TEXASUStrue
                            82.131.141.209
                            unknownHungary
                            20845DIGICABLEHUtrue
                            64.121.161.102
                            unknownUnited States
                            6079RCN-ASUStrue
                            178.175.187.254
                            unknownMoldova Republic of
                            43289TRABIAMDtrue
                            96.56.197.26
                            unknownUnited States
                            6128CABLE-NET-1UStrue
                            186.64.67.30
                            unknownArgentina
                            27953NODOSUDSAARtrue
                            188.28.19.84
                            unknownUnited Kingdom
                            206067H3GUKGBtrue
                            125.99.76.102
                            unknownIndia
                            17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                            81.101.185.146
                            unknownUnited Kingdom
                            5089NTLGBtrue
                            68.87.41.40
                            xfinity.comUnited States
                            7922COMCAST-7922USfalse
                            59.28.84.65
                            unknownKorea Republic of
                            4766KIXS-AS-KRKoreaTelecomKRtrue
                            105.186.128.181
                            unknownSouth Africa
                            37457Telkom-InternetZAtrue
                            76.86.31.59
                            unknownUnited States
                            20001TWC-20001-PACWESTUStrue
                            147.147.30.126
                            unknownUnited Kingdom
                            6871PLUSNETUKInternetServiceProviderGBtrue
                            96.87.28.170
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            75.109.111.89
                            unknownUnited States
                            19108SUDDENLINK-COMMUNICATIONSUStrue
                            78.92.133.215
                            unknownHungary
                            5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUtrue
                            124.122.47.148
                            unknownThailand
                            17552TRUE-AS-APTrueInternetCoLtdTHtrue
                            88.126.94.4
                            unknownFrance
                            12322PROXADFRtrue
                            85.57.212.13
                            unknownSpain
                            12479UNI2-ASEStrue
                            51.14.29.227
                            unknownUnited Kingdom
                            2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                            47.205.25.170
                            unknownUnited States
                            5650FRONTIER-FRTRUStrue
                            95.45.50.93
                            unknownIreland
                            5466EIRCOMInternetHouseIEtrue
                            80.12.88.148
                            unknownFrance
                            3215FranceTelecom-OrangeFRtrue
                            69.133.162.35
                            unknownUnited States
                            11426TWC-11426-CAROLINASUStrue
                            86.132.236.117
                            unknownUnited Kingdom
                            2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                            151.62.238.176
                            unknownItaly
                            1267ASN-WINDTREIUNETEUtrue
                            70.112.206.5
                            unknownUnited States
                            11427TWC-11427-TEXASUStrue
                            205.237.67.69
                            unknownCanada
                            11290CC-3272CAtrue
                            102.159.188.125
                            unknownTunisia
                            37705TOPNETTNtrue
                            151.65.167.77
                            unknownItaly
                            1267ASN-WINDTREIUNETEUtrue
                            76.178.148.107
                            unknownUnited States
                            10838OCEANIC-INTERNET-RRUStrue
                            89.36.206.69
                            unknownItaly
                            48544TECNOADSL-ASITtrue
                            69.242.31.249
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            193.253.100.236
                            unknownFrance
                            3215FranceTelecom-OrangeFRtrue
                            76.16.49.134
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            94.207.104.225
                            unknownUnited Arab Emirates
                            15802DU-AS1AEtrue
                            201.244.108.183
                            unknownColombia
                            19429ETB-ColombiaCOtrue
                            103.42.86.42
                            unknownIndia
                            133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
                            78.18.105.11
                            unknownIreland
                            2110AS-BTIREBTIrelandwaspreviouslyknownasEsatNetEUnettrue
                            80.6.50.34
                            unknownUnited Kingdom
                            5089NTLGBtrue
                            103.144.201.56
                            unknownunknown
                            139762MSSOLUTION-AS-APSolutionBDtrue
                            27.0.48.233
                            unknownIndia
                            132573SAINGN-AS-INSAINGNNetworkServicesINtrue
                            70.28.50.223
                            unknownCanada
                            577BACOMCAtrue
                            98.145.23.67
                            unknownUnited States
                            20001TWC-20001-PACWESTUStrue
                            47.149.134.231
                            unknownUnited States
                            5650FRONTIER-FRTRUStrue
                            82.125.44.236
                            unknownFrance
                            3215FranceTelecom-OrangeFRtrue
                            81.229.117.95
                            unknownSweden
                            3301TELIANET-SWEDENTeliaCompanySEtrue
                            89.129.109.27
                            unknownSpain
                            12479UNI2-ASEStrue
                            122.186.210.254
                            unknownIndia
                            9498BBIL-APBHARTIAirtelLtdINtrue
                            79.77.142.22
                            unknownUnited Kingdom
                            9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
                            90.78.147.141
                            unknownFrance
                            3215FranceTelecom-OrangeFRtrue
                            122.184.143.86
                            unknownIndia
                            9498BBIL-APBHARTIAirtelLtdINtrue
                            186.75.95.6
                            unknownPanama
                            11556CableWirelessPanamaPAtrue
                            50.68.186.195
                            unknownCanada
                            6327SHAWCAtrue
                            12.172.173.82
                            unknownUnited States
                            2386INS-ASUStrue
                            213.64.33.61
                            unknownSweden
                            3301TELIANET-SWEDENTeliaCompanySEtrue
                            79.168.224.165
                            unknownPortugal
                            2860NOS_COMUNICACOESPTtrue
                            86.97.55.89
                            unknownUnited Arab Emirates
                            5384EMIRATES-INTERNETEmiratesInternetAEtrue
                            176.142.207.63
                            unknownFrance
                            5410BOUYGTEL-ISPFRtrue
                            92.154.17.149
                            unknownFrance
                            3215FranceTelecom-OrangeFRtrue
                            174.58.146.57
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            78.160.146.127
                            unknownTurkey
                            9121TTNETTRtrue
                            58.186.75.42
                            unknownViet Nam
                            18403FPT-AS-APTheCorporationforFinancingPromotingTechnolotrue
                            223.166.13.95
                            unknownChina
                            17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
                            65.95.141.84
                            unknownCanada
                            577BACOMCAtrue
                            50.68.204.71
                            unknownCanada
                            6327SHAWCAtrue
                            71.38.155.217
                            unknownUnited States
                            209CENTURYLINK-US-LEGACY-QWESTUStrue
                            104.35.24.154
                            unknownUnited States
                            20001TWC-20001-PACWESTUStrue
                            220.240.164.182
                            unknownAustralia
                            7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
                            103.123.223.133
                            unknownIndia
                            138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
                            24.198.114.130
                            unknownUnited States
                            11351TWC-11351-NORTHEASTUStrue
                            2.36.64.159
                            unknownItaly
                            30722VODAFONE-IT-ASNITtrue
                            198.2.51.242
                            unknownUnited States
                            20001TWC-20001-PACWESTUStrue
                            92.9.45.20
                            unknownUnited Kingdom
                            13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
                            113.11.92.30
                            unknownBangladesh
                            7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
                            69.119.123.159
                            unknownUnited States
                            6128CABLE-NET-1UStrue
                            69.123.4.221
                            unknownUnited States
                            6128CABLE-NET-1UStrue
                            172.115.17.50
                            unknownUnited States
                            20001TWC-20001-PACWESTUStrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:878698
                            Start date and time:2023-05-31 01:58:09 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 14m 20s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:28
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:F072.dll
                            Detection:MAL
                            Classification:mal100.troj.evad.winDLL@31/23@2/100
                            EGA Information:
                            • Successful, ratio: 50%
                            HDC Information:
                            • Successful, ratio: 15.1% (good quality ratio 13.2%)
                            • Quality average: 68.1%
                            • Quality standard deviation: 33.7%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .dll
                            • Override analysis time to 240s for rundll32
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 13.107.42.254, 13.89.179.12, 20.189.173.20, 52.168.117.173, 104.77.34.176
                            • Excluded domains from analysis (whitelisted): l-9999.l-msedge.net, onedsblobprdeus16.eastus.cloudapp.azure.com, e10994.dscx.akamaiedge.net, l-ring.msedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, www.xfinity.com.edgekey.net, watson.telemetry.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, l-ring.l-9999.l-msedge.net
                            • Execution Graph export aborted for target rundll32.exe, PID 5240 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            TimeTypeDescription
                            01:59:11API Interceptor5x Sleep call for process: WerFault.exe modified
                            01:59:16API Interceptor1x Sleep call for process: loaddll32.exe modified
                            01:59:26API Interceptor9x Sleep call for process: wermgr.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9052702089985385
                            Encrypted:false
                            SSDEEP:192:MSi30oXJHBUZMX4jed+J/u7skS274ItWc:9iJX5BUZMX4jeU/u7skX4ItWc
                            MD5:2795598C49036A48A74A19DF9F6F4B71
                            SHA1:3476B54B18D415205AA7BFBC159B0C3859EF2287
                            SHA-256:B2F1023844ABF911348CBE9D7CA50C7105EE90FFB8E4C8B5446390AE79775D36
                            SHA-512:75BF83C487C031A3BC45C048AE4B4654F9322C144F01B698367F0184E2BAFD0B5BCAE1164195D1E396F8992020CC650CD831614D7B684823DE01B89AE4A9D236
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.7.6.8.2.0.3.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.8.5.4.1.4.0.8.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.4.c.f.f.9.2.-.a.0.5.5.-.4.d.8.9.-.8.f.b.5.-.b.8.b.a.3.5.5.f.1.7.b.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.3.0.1.e.0.8.-.a.8.c.6.-.4.4.0.2.-.b.e.c.4.-.d.4.b.8.6.e.b.4.e.2.d.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.5.8.-.0.0.0.1.-.0.0.1.9.-.1.2.3.7.-.e.1.2.d.9.e.9.3.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9054146093167813
                            Encrypted:false
                            SSDEEP:192:phwi70oXzHBUZMX4jed+J/u7skS274ItWc:4ilXzBUZMX4jeU/u7skX4ItWc
                            MD5:49188D2789A941249B4CB63AC1E845B9
                            SHA1:B63F793517964C5978508E37FD63CA0C4FA898C0
                            SHA-256:7C4D2E80D66AA2D87CA05C6ABC06E4D64448BFD2F54F46F22AA793D1DDD8B9D5
                            SHA-512:A56EA3CA2747333C5FB697D861EC2852C4B50EE3D4BC687215E952434EF6B9AFBE07B43EDD0551A6D7313134B4865482EDF45432167856B88FF1983D06899460
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.4.0.8.5.6.2.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.4.8.3.5.6.3.3.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.9.c.9.8.9.b.6.-.b.4.e.0.-.4.2.4.c.-.9.e.d.6.-.4.2.7.2.e.f.5.f.6.5.5.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.9.b.6.2.6.e.-.e.5.6.e.-.4.7.b.9.-.9.a.3.7.-.1.0.4.7.7.c.c.d.0.2.e.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.4.c.-.0.0.0.1.-.0.0.1.9.-.2.8.3.2.-.f.b.2.b.9.e.9.3.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9051018267592895
                            Encrypted:false
                            SSDEEP:192:O83iC0oXfHBUZMX4jed+J/u7skS274ItWcE:niEXfBUZMX4jeU/u7skX4ItWc
                            MD5:72783B5C2E9149B526FE3FE551816AEB
                            SHA1:E84E7D8BEC02CA368DC4153DE96FE0C6B90C2C36
                            SHA-256:76ABC4AEC718FFBCF5FFDD10C431EAC6C9D360FD9744615EC50DC38C94D21DD9
                            SHA-512:FC217BAC4324283728AFF5CDBE2FA5D49CABA9019C047DE0C17F714AB881D9AC980B751B2A5328CEB48F5D88675BD7B9174D8A8F88939DF0C5841B8094B5E57A
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.7.7.4.4.8.4.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.8.7.4.4.8.5.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.2.c.f.1.4.2.3.-.0.4.c.6.-.4.b.d.0.-.b.c.9.1.-.6.d.8.a.d.c.9.1.6.b.8.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.3.c.1.6.0.b.0.-.d.0.8.6.-.4.0.f.a.-.8.f.1.1.-.1.0.8.d.2.b.0.5.b.1.2.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.7.c.-.0.0.0.1.-.0.0.1.9.-.7.6.2.1.-.d.1.2.d.9.e.9.3.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9052431102174711
                            Encrypted:false
                            SSDEEP:192:8DQiv0oX4HBUZMX4jed+J/u7skS274ItWc:QQiRXgBUZMX4jeU/u7skX4ItWc
                            MD5:D21AA729B823707F84DBC63F024D2A76
                            SHA1:78896E9581FE6821301CAF57746428D8A309276B
                            SHA-256:1AC472C773F6AE8640794706AFBC628933EC7A0C526B8D4E9E145CFF58AA4484
                            SHA-512:9BC99C73D5732ED4DCAA4BA7557B71127125D7D45467290DF08EDB09B346DFC652078E04FC46A2E5642FC8857C58340C8C9498D59EFCC2A0F080D5501A99AB21
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.9.9.9.7.1.4.8.8.6.4.6.8.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.0.0.0.5.3.1.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.c.c.2.7.c.4.a.-.9.d.d.e.-.4.7.3.a.-.b.3.9.e.-.7.5.e.f.6.7.0.1.7.b.a.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.5.5.f.0.7.6.-.c.9.e.b.-.4.4.6.9.-.9.2.1.2.-.e.1.1.7.d.b.2.6.6.f.d.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.7.4.-.0.0.0.1.-.0.0.1.9.-.3.8.5.c.-.5.7.2.8.9.e.9.3.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9047557163759011
                            Encrypted:false
                            SSDEEP:192:igpQEiy0oXOHBUZMX4jed+J/u7skS274ItWc:+EiUXGBUZMX4jeU/u7skX4ItWc
                            MD5:A890360959956FA91ACD65B7D8B109FF
                            SHA1:BAFD4F337A275D13E113B7F8C340FF7E939875E5
                            SHA-256:F50CEE7D17BB46C96F76DD66B7A674F2D2B77C83628774EABDD29836233015FD
                            SHA-512:4B9549DD8BEA95B1EA63B8236205AF4C79595342530C6678FABD876D65F1666FB88BB21618C73BE0D7302CF59FA89B5AB663D9C13736FF4F6810190420ED8FF8
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.9.9.9.7.1.4.8.7.8.3.4.3.1.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.9.9.9.7.1.5.0.0.3.3.4.2.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.7.f.8.d.1.c.2.-.5.6.1.c.-.4.e.b.3.-.8.0.a.e.-.1.d.d.5.d.d.6.9.2.2.b.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.b.b.6.a.1.c.4.-.c.7.6.f.-.4.d.8.8.-.9.0.0.7.-.c.1.7.c.7.a.5.1.0.3.9.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.7.8.-.0.0.0.1.-.0.0.1.9.-.8.d.a.5.-.5.3.2.8.9.e.9.3.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed May 31 08:59:09 2023, 0x1205a4 type
                            Category:dropped
                            Size (bytes):44130
                            Entropy (8bit):2.1129885510184807
                            Encrypted:false
                            SSDEEP:192:HbbLGYJO5SkbzTHvlTNj7kq6tLCONWg+p75x3gKp:m5LbzbX7kq6tugBiPp
                            MD5:25DBEE74A690E169C438B8C53E54B64B
                            SHA1:D2DB3ED2AED13D260452E318C8341226F1BDE9D2
                            SHA-256:D4E4782FA9E93D76D8D765AE3D6AD65F865997002A3EAF241326CADEAE4CBC11
                            SHA-512:6E49B5B5B0BC9A55E0F7FFC5EAC84F161D7C919EF0395F2F4B86556F91A52F6A96571FE5CCA622C0D4292E804A448AA748D6CE3CF8BC840307242C5B619ADA96
                            Malicious:false
                            Preview:MDMP....... .......].wd.........................................,..........T.......8...........T...............b...........0................................................................................U...........B..............GenuineIntelW...........T.......x...[.wd.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed May 31 08:59:09 2023, 0x1205a4 type
                            Category:dropped
                            Size (bytes):36730
                            Entropy (8bit):2.289821263424622
                            Encrypted:false
                            SSDEEP:192:HA3ZcCZLCQHNU05O5SkbbxvDUlYaSXInl9qqKny7e/nBP:gJzna5LbbylJIIl9qqKy7OBP
                            MD5:3F788523D54D69153E49F78C5DC1FFBC
                            SHA1:70111FB41B318C2545143429F946EB91D3B439C2
                            SHA-256:21EA9344D447BCED9CB898CCA5031A43861DE7ABC6B0ADBB93AD64E782EF1BB9
                            SHA-512:34B10D476A18062CC6B581F47ACADA01AA02A137BA255B5AEA5571F8AB048BC0C508B1DC34CD5DFE43EA5A6C2D1DA762620F0A50E245C2F7CC49A367E2FD471E
                            Malicious:false
                            Preview:MDMP....... .......].wd............d...............l............)..........T.......8...........T...........P...*u...........................................................................................U...........B..............GenuineIntelW...........T.......t...[.wd.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8246
                            Entropy (8bit):3.6906597990132988
                            Encrypted:false
                            SSDEEP:192:Rrl7r3GLNiOs6m6Yke6hgmfTzSKCprd89bLDsfW5m:RrlsNi16m6Yd6hgmfTzS4LofZ
                            MD5:2D56FDC5A1187B14F8D847999495BAF9
                            SHA1:BDBB9B892C585E9CCF6105BBA25F4591DEFA8711
                            SHA-256:104AE929922673AE6473DA7ACD0085160B1F398697EDAABAE0B2D3187DF86579
                            SHA-512:A1CB1EFA91E5680B0162A3C03E76245C6FA1DDA6C4666E24F76BC0DF9506668C543E471B9EE4DA1855A8E2651C9BBE499E472EFD805C0205EBE1A06954135316
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.4.0.<./.P.i.d.>.......
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8240
                            Entropy (8bit):3.6895477595596304
                            Encrypted:false
                            SSDEEP:192:Rrl7r3GLNiPe67zB6Y6q6ngmfTzSKCprL89bLjsf4+5m:RrlsNi26J6YX6ngmfTzSuLIf4B
                            MD5:D3FFD1D8D70A1A68F0C9EA9A8C76FB5F
                            SHA1:78E54A155DAE18F6768EBDF2A3343D29A4FA71CD
                            SHA-256:A4E64D8FDC3BA36EED6669F3FADAA1806229133DB7901EBD273E6928A3D93350
                            SHA-512:0AAF3D061F82FE4BB7BEABE36A967527E30C4DFB1C0229696F5241F3AE30CD936E948B86D4DB4099C92CC41A048CBCBCF8A7B3CAB6647B752DE4695EB5C3E62B
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.3.6.<./.P.i.d.>.......
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4626
                            Entropy (8bit):4.451239707467063
                            Encrypted:false
                            SSDEEP:48:cvIwSD8zs6KJgtWI9J1Wgc8sqYjg8fm8M4JCdsNZFTQq+q8/MKV4SrSzd:uITf6YuEgrsqYJJHgqHKDWzd
                            MD5:62C66B351B574D2CBFBB67B481A63B8F
                            SHA1:CEE12EE81A9EE305CA89BBFC7A67D2733D67541E
                            SHA-256:2D984FEC02C7B1048A48DAFCD9A82917FBDC2C5D916EC186271D5A545DFFB429
                            SHA-512:7D32A7DFFD390D5763ED8D6436792BF138C852F5861E5DAB842F739F8CFBF06526CC486D208A2FB21554C50AC735CFD00A3355D7780393BBE017AA23755279F8
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2064609" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4626
                            Entropy (8bit):4.4535457779439005
                            Encrypted:false
                            SSDEEP:48:cvIwSD8zs6KJgtWI9J1Wgc8sqYj/8fm8M4JCdsNZFvmE+q8/MKNQ4SrSod:uITf6YuEgrsqYIJH1HJDWod
                            MD5:3437785D756624522B0240E8A2C39C9B
                            SHA1:9CB9C7D318CEA29B39761E48F239709B44DB0760
                            SHA-256:7CB093CB2B8468C817BB7A0F326D186B8972E8A4C30C6E3FC99B4DF17C8C06DA
                            SHA-512:6CAEDBE89D80EBCE1D51AC0478464BCFDAF7FD2A4A1C7011AC4C70FE0D87B45141DAFFD31650F70B60825843C98F61C89E77935F5C3B8CAEB01EA10875632377
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2064609" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed May 31 08:59:14 2023, 0x1205a4 type
                            Category:dropped
                            Size (bytes):39450
                            Entropy (8bit):2.1531100420995837
                            Encrypted:false
                            SSDEEP:192:wPOCZLCQHNwZl7O5SkbUiw++i3KDebKflAAUSZ2en:2neC5Lbi++CKDebqlSSp
                            MD5:C5E17D29856DFC35767A676CF84016D6
                            SHA1:2226CB71032CB6B11C1BF076DE5F3045A80AE422
                            SHA-256:590DAC5484A34824E216529042441ABCA963BFBFB40584A32AB3B6644875EF39
                            SHA-512:0B55FC781C91732FCF0990C834BC639FAD94C48EAE531DDFBC189A96270AFCB63FCB3D8B125DAAFC87509CB967421D8C3392A17E65148A3AC957C92BBA2A34CB
                            Malicious:false
                            Preview:MDMP....... .......b.wd............d...............l............)..........T.......8...........T............................................................................................................U...........B..............GenuineIntelW...........T.......L...a.wd.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8244
                            Entropy (8bit):3.692276707994812
                            Encrypted:false
                            SSDEEP:192:Rrl7r3GLNiPI67zr6YkG6FPgmfTTSKCprt89bPFsfglm:RrlsNig6T6YV6NgmfTTSIPeff
                            MD5:744E4FC73CE2424E1A7692483AD7E452
                            SHA1:2A70A2BD8BB4667E5200C738BF7C9766670F66D9
                            SHA-256:62F8466E1B7AD52F869F215C0F68F0F204BB0858F9E69B618782A28993F4E30D
                            SHA-512:E9781E833BE3C4D3EC7CC0445EB6B7B67108A5A47E4AB33C691680C97C5C4916550703C83ADB807EB9AEEC0D5F4BCDBFBE3C9DDCDED0811AB905A94839E0974D
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.0.8.<./.P.i.d.>.......
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4626
                            Entropy (8bit):4.453635537014888
                            Encrypted:false
                            SSDEEP:48:cvIwSD8zs6KJgtWI9J1Wgc8sqYje8fm8M4JCdsN9FS+q8/M8i4SrSUd:uITf6YuEgrsqY/JHaHrDWUd
                            MD5:F6BF7F749FEBDF7C91074040214DEFC9
                            SHA1:29C636DDD4AD7B9BE52883AA26BCEC0020DF7DC1
                            SHA-256:F29EA7AF59CEE3A0646E241F9F44061472081D74250B449B50A9E6853F5FA691
                            SHA-512:5A2CCCFB9A95EAA052E422D2346C21B594F581423F9E5F4AA61DA8AF347FF1273BBB6F7EEDFB619A3AD73E2BF202D9EA61C462ACBAF97BCBCE3027871420B7C7
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2064609" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed May 31 08:59:17 2023, 0x1205a4 type
                            Category:dropped
                            Size (bytes):44710
                            Entropy (8bit):2.079213774155661
                            Encrypted:false
                            SSDEEP:192:v86GYxeIO5Skb0vRqUElyt5MhtoiSLle//zHOX:iP5Lb0pqUEQwwiSsDOX
                            MD5:F7A316A5DD606F44B34C9C2DFD37C52F
                            SHA1:00FEF71008DB10C2A4C92E1953241FA55E211D6C
                            SHA-256:D71279CDB337C4CFFB42D01D1933916E3E366A5CEC960810C46D61EC69DF1A51
                            SHA-512:152E98F6101AFE73423F48A4973EF3FE7FCB8FDA37E74B51A02E5A9834A2243CA1679C9E667A24BAB3C8C235457BFC4D854B9DBBCDAAC8D3D0637E079EC6E347
                            Malicious:false
                            Preview:MDMP....... .......e.wd.........................................,..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T.......X...d.wd.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Wed May 31 08:59:17 2023, 0x1205a4 type
                            Category:dropped
                            Size (bytes):43190
                            Entropy (8bit):2.121163250343507
                            Encrypted:false
                            SSDEEP:192:v6HSqGYOrTuO5SkbfP1n5I9j/14atXq/:/Rrl5Lbn9sj/qa8
                            MD5:717039D5BED6AC2140741073F17C6955
                            SHA1:742C0581B19062B5E1606620B0332CFAEEBA7768
                            SHA-256:AC706A4DBD9A33019CE2FC951619C4F27F9043D3649DD93ED97C7394F9DE4D4E
                            SHA-512:50480FE95DF6D48C472CB28C2FE39835C563512E7E01A6E73AFACDB16565AB8F3A7F53E38CC52BFD5AB626BDE16513C01C92B9FC3E47834364415A738662370E
                            Malicious:false
                            Preview:MDMP....... .......e.wd.........................................,..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T.......|...d.wd.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8238
                            Entropy (8bit):3.6919377532907744
                            Encrypted:false
                            SSDEEP:192:Rrl7r3GLNigw6iut6YEQH6oVgmfTTSKCpr789bU3sf98m:RrlsNi36Z6YRH6oVgmfTTSeU8fz
                            MD5:F693FBFF828EB8D926E85592657E9A86
                            SHA1:3D25D9728FC1A237729E12971748454391FFC963
                            SHA-256:09B556366919F789D2F702D19B90D6396AA229EC62E75EEFC2D84D1E1DCA3326
                            SHA-512:18E824BB6682ED96431F7F599D1853A2ED31943F6816B45F744AED5A1E49BF19FFF03102FEA4A70C93CE6D063B1665F32FB487B79FF399A65AAF2218AAFCF007
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.6.9.6.<./.P.i.d.>.......
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4626
                            Entropy (8bit):4.450065698293171
                            Encrypted:false
                            SSDEEP:48:cvIwSD8zs6KJgtWI9J1Wgc8sqYjL8fm8M4JCdsN9FyW+q8/M8PM4SrS9d:uITf6YuEgrsqYUJH6WH+MDW9d
                            MD5:F64E5BE2DC72CF4776D0177799C38614
                            SHA1:056F50C273A53C66900BFAB4953CB5D2B8830347
                            SHA-256:699AD5A6DD693739E075E1A9E77EC43DB1F15142DF384848DFE3A7C6CF9DB4E9
                            SHA-512:29FE514E25CC8CF512CCADE05C1E4D9659F59CFBD359DC1D15A138FAD6156697FD7ABE135438A1E0E5A51BF309C6A85498D391C88FB7C5909B71B1EE1A720DD7
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2064609" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8238
                            Entropy (8bit):3.6900503215815847
                            Encrypted:false
                            SSDEEP:192:Rrl7r3GLNiHo6K6YEQZ6oVgmfTzSKCprV89bjxsf9Bm:RrlsNiI6K6YRZ6oVgmfTzSAjqfS
                            MD5:8D3AC99AEBAA386223D0BE0CCA333B3D
                            SHA1:B0336139179E00A4EA682B03352756F9535B0104
                            SHA-256:661224D073EC345AA4DFC54C81A3A124423BA4BA09034149F74DFC236F9E3E22
                            SHA-512:FFFFCF19CE24725AE8E56A0A82EE9387FF5952964E92CB29C61358C16B1A3D54A011FCE34B5F45E71F192B07FACB0B3DD2475C6AC45E789F58BA9BFD412B8862
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.3.2.<./.P.i.d.>.......
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4626
                            Entropy (8bit):4.449631812720434
                            Encrypted:false
                            SSDEEP:48:cvIwSD8zs6KJgtWI9J1Wgc8sqYjLs8fm8M4JCdsNZFur+q8/MKJJ4SrSchd:uITf6YuEgrsqYvRJHyrHUJDW4d
                            MD5:118164DD345DD310D351B30EA875EB39
                            SHA1:0933DC3A6B0A0AC57B6144CD17E96DF3CAF0169A
                            SHA-256:A05EABFF7766F77A2C01E07AFD4DE41CFC6C97C2B9DB53D6C60C5594DDF63139
                            SHA-512:85E0BF8EA0EC65EB91AD5A7F5EE50CC61F80AAF01654093BCF4A9FE540BE62C9FE3A177CCC4FB537D9040D390E97E6AC38B0B5EB190F70BF6FAF5E6C4CB290E3
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2064609" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                            Process:C:\Windows\SysWOW64\wermgr.exe
                            File Type:HTML document, ASCII text, with very long lines (65212)
                            Category:dropped
                            Size (bytes):149507
                            Entropy (8bit):5.28662942755702
                            Encrypted:false
                            SSDEEP:3072:2DbDv9PpwZW+V6ssCcVwjhrTFJnZV12KfgxmyLjsfqW:EcgvW
                            MD5:8AE3F8E84A72A4D14E4D04A25143D7F8
                            SHA1:564305FB38FCDFB369082CDB94D568B6CDAA58F5
                            SHA-256:C09BE827203DCD4DA4509396F5E38BBA16343CE9B2E3EF1770E8240F38ED0073
                            SHA-512:27AECBF22B846427E74C00240DD0E140CCBF8FF67D5DB258327EBE3F469AE0F9190227BF924028F4F3E4F3A594644BA53ECCAB81FE6E62E32CB8852353A727E4
                            Malicious:false
                            Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name="theme-color" content="#000000"><script>if (typeof window !== "undefined" && typeof window.process === "undefined") {. window.process = window.process || { env: {} };. }</script><script type="env-config">{"clientId":"xfinity-learn-ui","sitecoreApiKey":"{1A57AE5E-AF7C-4A9E-803A-C756E3F23267}","sitecoreApiUrl":"https://jss.xfinity.com/","dictionaryKey":"{5FA0A82E-BBDB-4FBD-A3F4-9C5D07AA6E0E}","uniform":false,"oAuth":{"clientId":"shoplearn-web","endpoint":"https://oauth.xfinity.com"},"endpoints":{"ssmEnv":"https://api.sc.xfinity.com","aiQApiUrl":"https://aiq-prod.codebig2.net","errorRedirectUrl":"https://www.xfinity.com/learn/landing/sorry","cspApiUrl":"https://csp-prod.codebig2.net","dataLayerTimelineApiUrl":"https://bdl43tfhab.execute-api.us-east-1.amazonaws.com/prod/aiq-banner"},"environment":{"name":"PROD"},"appName":"xfinity-lea
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1572864
                            Entropy (8bit):4.344707996596824
                            Encrypted:false
                            SSDEEP:12288:M8odQ/1jG7/qSK5qm+YoORoAiqurRW8i75Y6wBVX63J3D+OIFDywD:zodQ/1jG7/qSK5q3s/
                            MD5:8A4BF0040203A623B1F8AD75BC282CA7
                            SHA1:5C33FDF440CCB695C145C73EE88EE00A522BE8DE
                            SHA-256:B8BE5379A07E6D14486E1C642DFAB62E06FB6E6126AC1E61B28DC9F13D0A7250
                            SHA-512:FA387441E97B12292A06FFADB5895D43F771F7DC8A97A7BFF76DEDC33D9507A4A9A01EC643FF555013DC77663DDBFE7AEEBFA5BE52C03BC2F2240C9104D50916
                            Malicious:false
                            Preview:regf[...[...p.\..,.................. ....P......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm"..(.................................................................................................................................................................................................................................................................................................................................................V.u........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):24576
                            Entropy (8bit):3.4598446705021955
                            Encrypted:false
                            SSDEEP:384:21pH5+XpnxSw4nhfude3eScNehhfude3eS+:6ZSMw4nhfR3eSuehhfR3eS
                            MD5:CBEA7AD55871A2001B030B4E61C95537
                            SHA1:24BE2836B59F39C05B9B3F836ABB38A6D91B3909
                            SHA-256:30C323EE3A4854EF4E5943EFC29D158624C3E4F970970816BE546B3781827E4B
                            SHA-512:6979C1F1AFD2AA862B01C9E94CD618F1AC7D953DC8B638219A227AC1DCE1C36B46A4A29F1B5F7A9BF5D18278EBF58D61C8F2FB52C2ECD4B6D9CEA49F0468526B
                            Malicious:false
                            Preview:regfZ...Z...p.\..,.................. ....P......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm"..(.................................................................................................................................................................................................................................................................................................................................................V.uHvLE.>......Z....P.......:.$n.y.l.7......................@......hbin................p.\..,..........nk,..X.(.................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ..X.(........ ...........P............... .......Z.......................Root........lf......Root....nk ..X.(.....................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...
                            File type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                            Entropy (8bit):6.665193018402438
                            TrID:
                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                            • Generic Win/DOS Executable (2004/3) 0.20%
                            • DOS Executable Generic (2002/1) 0.20%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:F072.dll
                            File size:983328
                            MD5:0f25933ea364d051e10480e68cbf4ae7
                            SHA1:bcc95a67d10b389e7c58159911ceac3ba92bef0b
                            SHA256:f2e4cbb34cd7431ceb5a186fddd3b38736e5e327afff8dff5d87fe4a6a64048f
                            SHA512:067a8089aec626574f3dac7f3b38102671dae4c1121c9b8efa0d38800300275947d9ca73a41233b489672603d4fa099b48785e35e834c907d77d5ee2438d4d22
                            SSDEEP:24576:D7AkdHt+UnNtqbVotX4Dw/9JGCZdBK/+NYouXFPn/yd4X:DZ8RDwlJGoY7XX
                            TLSH:6D258EC0FBD744FAE46718B1B09AB7AFAB3112050138CE76DFA58E09E976B401DDB245
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....0d...........#...'.....................................................0 .....{.....@... .........................hC.
                            Icon Hash:7ae282899bbab082
                            Entrypoint:0x10001390
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x10000000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x6430AE80 [Sat Apr 8 00:00:00 2023 UTC]
                            TLS Callbacks:0x10090cc0, 0x10090c70, 0x100a1c60
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:ac404a1028e7ce450416867d9b3974cc
                            Instruction
                            sub esp, 0Ch
                            mov dword ptr [101D86FCh], 00000000h
                            mov ecx, dword ptr [esp+18h]
                            mov edx, dword ptr [esp+14h]
                            mov eax, dword ptr [esp+10h]
                            call 00007F80B0BFFD97h
                            add esp, 0Ch
                            retn 000Ch
                            lea esi, dword ptr [esi+00000000h]
                            lea esi, dword ptr [esi+00h]
                            nop
                            sub esp, 1Ch
                            mov eax, dword ptr [esp+20h]
                            mov dword ptr [esp], 100C9000h
                            mov dword ptr [esp+04h], eax
                            call 00007F80B0C9ED2Eh
                            add esp, 1Ch
                            ret
                            nop
                            nop
                            nop
                            nop
                            nop
                            push ebp
                            mov ebp, esp
                            sub esp, 18h
                            mov dword ptr [esp], 10001400h
                            call 00007F80B0BFFF13h
                            leave
                            ret
                            lea esi, dword ptr [esi+00000000h]
                            lea esi, dword ptr [esi+00h]
                            nop
                            ret
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            nop
                            push ebp
                            push edi
                            push esi
                            push ebx
                            mov edx, dword ptr [esp+14h]
                            mov esi, dword ptr [esp+1Ch]
                            mov edi, dword ptr [esp+18h]
                            movzx ebx, dx
                            shr edx, 10h
                            test esi, esi
                            je 00007F80B0BFFFC8h
                            nop
                            cmp esi, 04h
                            jbe 00007F80B0BFFF82h
                            lea esi, dword ptr [esi+00000000h]
                            lea esi, dword ptr [esi+00h]
                            movzx eax, byte ptr [edi]
                            add edi, 04h
                            sub esi, 04h
                            movzx ebp, byte ptr [edi-03h]
                            movzx ecx, byte ptr [edi-02h]
                            add eax, ebx
                            movzx ebx, byte ptr [edi-01h]
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x1da0000x4368.edata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1df0000x1388.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e30000x378.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e40000x4128.rsrc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0xc61e40x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x1df3280x2c4.idata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xab1240xab200False0.4480831126734843data6.432110661692397IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .data0xad0000x1000x200False0.28125Matlab v4 mat-file (little endian) \377\377\377\377 , text, rows 4294967295, columns 4294967295, imaginary2.102897197014083IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rdata0xae0000x1a6240x1a800False0.3911224941037736data5.329684115990636IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .bss0xc90000x1102640x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .edata0x1da0000x43680x4400False0.4040670955882353data5.488698281853443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .idata0x1df0000x13880x1400False0.3810546875data5.386273709762828IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .CRT0x1e10000x300x200False0.060546875data0.25451054171027127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0x1e20000x80x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1e30000x1a64e0x1b000False0.9544722945601852data7.904997942181886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .reloc0x1fe0000x41280x4200False0.7178030303030303data6.590473987933104IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0x1e30580x31cdataEnglishUnited States
                            DLLImport
                            bcrypt.dllBCryptCloseAlgorithmProvider, BCryptGenRandom, BCryptOpenAlgorithmProvider
                            KERNEL32.dllAcquireSRWLockExclusive, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileMappingA, CreateMutexA, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FileTimeToSystemTime, FreeLibrary, GetConsoleMode, GetConsoleScreenBufferInfo, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetFullPathNameW, GetHandleInformation, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessAffinityMask, GetProcessTimes, GetStdHandle, GetSystemDirectoryW, GetSystemTimeAdjustment, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetThreadTimes, GetTickCount64, GetTimeZoneInformation, InitOnceBeginInitialize, InitOnceComplete, InitializeConditionVariable, InitializeCriticalSection, InitializeSRWLock, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryExW, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReleaseMutex, ReleaseSRWLockExclusive, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, SetConsoleTextAttribute, SetEvent, SetLastError, SetProcessAffinityMask, SetSystemTime, SetThreadContext, SetThreadPriority, Sleep, SleepConditionVariableSRW, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW
                            msvcrt.dll__mb_cur_max, __setusermatherr, _aligned_free, _aligned_malloc, _aligned_realloc, _amsg_exit, _beginthreadex, _endthreadex, _errno, _fstat64, _get_osfhandle, _gmtime64, _hypot, _initterm, _iob, _localtime64, _lock, _mktime64, _setjmp3, _sopen, _ultoa, _unlock, _wsopen, abort, acos, asin, atan, atoi, bsearch, calloc, clock, cosh, exit, fprintf, fputc, fputs, free, fwrite, getc, getenv, islower, isspace, isupper, isxdigit, localeconv, log10, malloc, memchr, memcmp, memcpy, memmove, memset, printf, rand, realloc, setlocale, sinh, strchr, strcmp, strcpy, strcspn, strerror, strftime, strlen, strncmp, strrchr, strspn, strstr, strtol, strtoul, tan, tanh, tolower, ungetc, vfprintf, wcscat, wcscpy, wcslen, wcsrchr, longjmp, _strdup, _read, _isatty, _fdopen, _close
                            USER32.dllGetDesktopWindow
                            NameOrdinalAddress
                            mv_add_i10x10023c30
                            mv_add_q20x10035990
                            mv_add_stable30x10027e10
                            mv_adler32_update40x10001410
                            mv_aes_alloc50x10001bd0
                            mv_aes_crypt60x10001bf0
                            mv_aes_ctr_alloc70x100022f0
                            mv_aes_ctr_crypt80x10002480
                            mv_aes_ctr_free90x10002420
                            mv_aes_ctr_get_iv100x10002370
                            mv_aes_ctr_increment_iv110x10002430
                            mv_aes_ctr_init120x100023c0
                            mv_aes_ctr_set_full_iv130x10002340
                            mv_aes_ctr_set_iv140x10002310
                            mv_aes_ctr_set_random_iv150x10002380
                            mv_aes_init160x10001c10
                            mv_aes_size170x100ae00c
                            mv_append_path_component180x10006eb0
                            mv_asprintf190x10006850
                            mv_assert0_fpu200x1008cfa0
                            mv_audio_fifo_alloc210x10002670
                            mv_audio_fifo_drain220x10002af0
                            mv_audio_fifo_free230x10002610
                            mv_audio_fifo_peek240x10002900
                            mv_audio_fifo_peek_at250x10002990
                            mv_audio_fifo_read260x10002a40
                            mv_audio_fifo_realloc270x100027b0
                            mv_audio_fifo_reset280x10002b70
                            mv_audio_fifo_size290x10002bb0
                            mv_audio_fifo_space300x10002bc0
                            mv_audio_fifo_write310x10002850
                            mv_base64_decode320x100076c0
                            mv_base64_encode330x100078d0
                            mv_basename340x10006d70
                            mv_blowfish_alloc350x10007da0
                            mv_blowfish_crypt360x100084b0
                            mv_blowfish_crypt_ecb370x10007dc0
                            mv_blowfish_init380x100a6ac0
                            mv_bmg_get390x10024fe0
                            mv_bprint_append_data400x10008f30
                            mv_bprint_channel_layout410x1000c9f0
                            mv_bprint_chars420x10008d20
                            mv_bprint_clear430x10009670
                            mv_bprint_escape440x10009730
                            mv_bprint_finalize450x10009690
                            mv_bprint_get_buffer460x10009500
                            mv_bprint_init470x10008880
                            mv_bprint_init_for_buffer480x100089a0
                            mv_bprint_strftime490x10009130
                            mv_bprintf500x100089c0
                            mv_buffer_alloc510x10009dc0
                            mv_buffer_allocz520x10009ef0
                            mv_buffer_create530x10009e60
                            mv_buffer_default_free540x10009d10
                            mv_buffer_get_opaque550x1000a090
                            mv_buffer_get_ref_count560x1000a0a0
                            mv_buffer_is_writable570x1000a070
                            mv_buffer_make_writable580x1000a0b0
                            mv_buffer_pool_buffer_get_opaque590x1000a9b0
                            mv_buffer_pool_get600x1000a720
                            mv_buffer_pool_init610x1000a5f0
                            mv_buffer_pool_init2620x1000a590
                            mv_buffer_pool_uninit630x1000a650
                            mv_buffer_realloc640x1000a1d0
                            mv_buffer_ref650x10009fc0
                            mv_buffer_replace660x1000a480
                            mv_buffer_unref670x1000a000
                            mv_calloc680x100291f0
                            mv_camellia_alloc690x1000b0b0
                            mv_camellia_crypt700x1000b0d0
                            mv_camellia_init710x100a6c8e
                            mv_camellia_size720x100af650
                            mv_cast5_alloc730x1000c090
                            mv_cast5_crypt740x1000c1b0
                            mv_cast5_crypt2750x1000c0b0
                            mv_cast5_init760x100a7a6e
                            mv_cast5_size770x100b1a60
                            mv_channel_description780x1000c470
                            mv_channel_description_bprint790x1000c3c0
                            mv_channel_from_string800x1000c560
                            mv_channel_layout_channel_from_index810x1000dc10
                            mv_channel_layout_channel_from_string820x1000eac0
                            mv_channel_layout_check830x1000ec10
                            mv_channel_layout_compare840x1000edb0
                            mv_channel_layout_copy850x1000d340
                            mv_channel_layout_default860x1000eff0
                            mv_channel_layout_describe870x1000dba0
                            mv_channel_layout_describe_bprint880x1000d4d0
                            mv_channel_layout_extract_channel890x1000d060
                            mv_channel_layout_from_mask900x1000d1b0
                            mv_channel_layout_from_string910x1000dd40
                            mv_channel_layout_index_from_channel920x1000e760
                            mv_channel_layout_index_from_string930x1000e950
                            mv_channel_layout_standard940x1000f050
                            mv_channel_layout_subset950x1000f080
                            mv_channel_layout_uninit960x1000d270
                            mv_channel_name970x1000c2d0
                            mv_channel_name_bprint980x1000c220
                            mv_chroma_location_enum_to_pos990x10034f30
                            mv_chroma_location_from_name1000x10034ee0
                            mv_chroma_location_name1010x10034ec0
                            mv_chroma_location_pos_to_enum1020x10034f70
                            mv_cmp_i1030x10024200
                            mv_color_primaries_from_name1040x10034d90
                            mv_color_primaries_name1050x10034d70
                            mv_color_range_from_name1060x10034d20
                            mv_color_range_name1070x10034d00
                            mv_color_space_from_name1080x10034e70
                            mv_color_space_name1090x10034e50
                            mv_color_transfer_from_name1100x10034e00
                            mv_color_transfer_name1110x10034de0
                            mv_compare_mod1120x100279f0
                            mv_compare_ts1130x10027830
                            mv_content_light_metadata_alloc1140x10027020
                            mv_content_light_metadata_create_side_data1150x10027050
                            mv_cpu_count1160x1000f8f0
                            mv_cpu_force_count1170x1000f9e0
                            mv_cpu_max_align1180x1000f9f0
                            mv_crc1190x100101d0
                            mv_crc_get_table1200x1000fdb0
                            mv_crc_init1210x1000fbc0
                            mv_csp_luma_coeffs_from_avcsp1220x100102b0
                            mv_csp_primaries_desc_from_id1230x100102f0
                            mv_csp_primaries_id_from_desc1240x10010320
                            mv_d2q1250x10035aa0
                            mv_d2str1260x100068e0
                            mv_default_get_category1270x10026240
                            mv_default_item_name1280x10026230
                            mv_des_alloc1290x10010d80
                            mv_des_crypt1300x10010e40
                            mv_des_init1310x10010da0
                            mv_des_mac1320x10010e90
                            mv_detection_bbox_alloc1330x10010ee0
                            mv_detection_bbox_create_side_data1340x10010f70
                            mv_dict_copy1350x10011d20
                            mv_dict_count1360x10011070
                            mv_dict_free1370x10011cc0
                            mv_dict_get1380x100110d0
                            mv_dict_get_string1390x100121a0
                            mv_dict_iterate1400x10011090
                            mv_dict_parse_string1410x100118c0
                            mv_dict_set1420x10011210
                            mv_dict_set_int1430x10011560
                            mv_dirname1440x10006e10
                            mv_display_matrix_flip1450x100126f0
                            mv_display_rotation_get1460x10012470
                            mv_display_rotation_set1470x100125c0
                            mv_div_i1480x10024ef0
                            mv_div_q1490x10035920
                            mv_dovi_alloc1500x10012780
                            mv_dovi_metadata_alloc1510x100127b0
                            mv_downmix_info_update_side_data1520x10012800
                            mv_dynamic_hdr_plus_alloc1530x1001d0a0
                            mv_dynamic_hdr_plus_create_side_data1540x1001d0d0
                            mv_dynamic_hdr_vivid_alloc1550x1001d130
                            mv_dynamic_hdr_vivid_create_side_data1560x1001d160
                            mv_dynarray2_add1570x100296f0
                            mv_dynarray_add1580x10029620
                            mv_dynarray_add_nofree1590x10029560
                            mv_encryption_info_add_side_data1600x10012f30
                            mv_encryption_info_alloc1610x10012a70
                            mv_encryption_info_clone1620x10012b40
                            mv_encryption_info_free1630x10012cf0
                            mv_encryption_info_get_side_data1640x10012d40
                            mv_encryption_init_info_add_side_data1650x10013860
                            mv_encryption_init_info_alloc1660x10013100
                            mv_encryption_init_info_free1670x100132d0
                            mv_encryption_init_info_get_side_data1680x10013480
                            mv_escape1690x10007050
                            mv_expr_count_func1700x100176e0
                            mv_expr_count_vars1710x10017650
                            mv_expr_eval1720x100177a0
                            mv_expr_free1730x10015280
                            mv_expr_parse1740x10017110
                            mv_expr_parse_and_eval1750x100177f0
                            mv_fast_malloc1760x10029d10
                            mv_fast_mallocz1770x10029df0
                            mv_fast_realloc1780x10029c60
                            mv_fifo_alloc1790x10018a20
                            mv_fifo_alloc21800x10017e40
                            mv_fifo_alloc_array1810x10018990
                            mv_fifo_auto_grow_limit1820x10017ef0
                            mv_fifo_can_read1830x10017f10
                            mv_fifo_can_write1840x10017f40
                            mv_fifo_drain1850x100192b0
                            mv_fifo_drain21860x100188c0
                            mv_fifo_elem_size1870x10017f00
                            mv_fifo_free1880x10018aa0
                            mv_fifo_freep1890x10018ae0
                            mv_fifo_freep21900x10018950
                            mv_fifo_generic_peek1910x10019120
                            mv_fifo_generic_peek_at1920x10018fc0
                            mv_fifo_generic_read1930x10019160
                            mv_fifo_generic_write1940x10018e70
                            mv_fifo_grow1950x10018ce0
                            mv_fifo_grow21960x10017f70
                            mv_fifo_peek1970x10018760
                            mv_fifo_peek_to_cb1980x100188a0
                            mv_fifo_read1990x10018500
                            mv_fifo_read_to_cb2000x100186c0
                            mv_fifo_realloc22010x10018b70
                            mv_fifo_reset2020x10018b20
                            mv_fifo_reset22030x10018930
                            mv_fifo_size2040x10018b40
                            mv_fifo_space2050x10018b50
                            mv_fifo_write2060x100180f0
                            mv_fifo_write_from_cb2070x100182a0
                            mv_file_map2080x100192e0
                            mv_file_unmap2090x10019570
                            mv_film_grain_params_alloc2100x10019b60
                            mv_film_grain_params_create_side_data2110x10019b90
                            mv_find_best_pix_fmt_of_22120x10034a40
                            mv_find_info_tag2130x10032410
                            mv_find_nearest_q_idx2140x10035e60
                            mv_fopen_utf82150x10019b50
                            mv_force_cpu_flags2160x1000f820
                            mv_fourcc_make_string2170x1008ced0
                            mv_frame_alloc2180x1001ac40
                            mv_frame_apply_cropping2190x1001c490
                            mv_frame_clone2200x1001c050
                            mv_frame_copy2210x1001b8d0
                            mv_frame_copy_props2220x1001b550
                            mv_frame_free2230x1001adb0
                            mv_frame_get_buffer2240x1001adf0
                            mv_frame_get_plane_buffer2250x1001b570
                            mv_frame_get_side_data2260x1001b890
                            mv_frame_is_writable2270x1001b4b0
                            mv_frame_make_writable2280x1001c210
                            mv_frame_move_ref2290x1001b320
                            mv_frame_new_side_data2300x1001b7e0
                            mv_frame_new_side_data_from_buf2310x1001b750
                            mv_frame_ref2320x1001bc40
                            mv_frame_remove_side_data2330x1001c3e0
                            mv_frame_side_data_name2340x1001c470
                            mv_frame_unref2350x1001b300
                            mv_free2360x100290d0
                            mv_freep2370x100290e0
                            mv_gcd2380x10027090
                            mv_gcd_q2390x100362f0
                            mv_get_alt_sample_fmt2400x1003c9f0
                            mv_get_bits_per_pixel2410x100345a0
                            mv_get_bytes_per_sample2420x1003cb50
                            mv_get_channel_description2430x1000cf80
                            mv_get_channel_layout2440x1000c640
                            mv_get_channel_layout_channel_index2450x1000cd50
                            mv_get_channel_layout_nb_channels2460x1000cc80
                            mv_get_channel_layout_string2470x1000cbf0
                            mv_get_channel_name2480x1000cea0
                            mv_get_colorspace_name2490x1001ac20
                            mv_get_cpu_flags2500x1000f880
                            mv_get_default_channel_layout2510x1000cd10
                            mv_get_extended_channel_layout2520x1000c8f0
                            mv_get_known_color_name2530x10031760
                            mv_get_media_type_string2540x1008cd60
                            mv_get_packed_sample_fmt2550x1003ca30
                            mv_get_padded_bits_per_pixel2560x100345f0
                            mv_get_picture_type_char2570x1008cd80
                            mv_get_pix_fmt2580x10034480
                            mv_get_pix_fmt_loss2590x10034a10
                            mv_get_pix_fmt_name2600x10034450
                            mv_get_pix_fmt_string2610x100346a0
                            mv_get_planar_sample_fmt2620x1003ca70
                            mv_get_random_seed2630x10035030
                            mv_get_sample_fmt2640x1003c860
                            mv_get_sample_fmt_name2650x1003c840
                            mv_get_sample_fmt_string2660x1003caa0
                            mv_get_standard_channel_layout2670x1000d150
                            mv_get_time_base_q2680x1008cf90
                            mv_get_token2690x10006940
                            mv_gettime2700x1004dbb0
                            mv_gettime_relative2710x1004dbf0
                            mv_gettime_relative_is_monotonic2720x1004dc60
                            mv_hash_alloc2730x1001c790
                            mv_hash_final2740x1001cb30
                            mv_hash_final_b642750x1001ce80
                            mv_hash_final_bin2760x1001cbc0
                            mv_hash_final_hex2770x1001ce00
                            mv_hash_freep2780x1001d070
                            mv_hash_get_name2790x1001c770
                            mv_hash_get_size2800x1001c780
                            mv_hash_init2810x1001c870
                            mv_hash_names2820x1001c750
                            mv_hash_update2830x1001ca10
                            mv_hmac_alloc2840x1001d220
                            mv_hmac_calc2850x1001d720
                            mv_hmac_final2860x1001d5a0
                            mv_hmac_free2870x1001d3a0
                            mv_hmac_init2880x1001d3e0
                            mv_hmac_update2890x1001d590
                            mv_hwdevice_ctx_alloc2900x1001d9d0
                            mv_hwdevice_ctx_create2910x1001e0b0
                            mv_hwdevice_ctx_create_derived2920x1001e320
                            mv_hwdevice_ctx_create_derived_opts2930x1001e190
                            mv_hwdevice_ctx_init2940x1001db30
                            mv_hwdevice_find_type_by_name2950x1001d920
                            mv_hwdevice_get_hwframe_constraints2960x1001dfd0
                            mv_hwdevice_get_type_name2970x1001d970
                            mv_hwdevice_hwconfig_alloc2980x1001dfa0
                            mv_hwdevice_iterate_types2990x1001d990
                            mv_hwframe_constraints_free3000x1001e070
                            mv_hwframe_ctx_alloc3010x1008d450
                            mv_hwframe_ctx_create_derived3020x1001ea30
                            mv_hwframe_ctx_init3030x1001e7f0
                            mv_hwframe_get_buffer3040x1001e690
                            mv_hwframe_map3050x1001e450
                            mv_hwframe_transfer_data3060x1001dd70
                            mv_hwframe_transfer_get_formats3070x1001dd40
                            mv_i2int3080x10024fb0
                            mv_image_alloc3090x10021d20
                            mv_image_check_sar3100x100222b0
                            mv_image_check_size3110x100221c0
                            mv_image_check_size23120x10022070
                            mv_image_copy3130x10022610
                            mv_image_copy_plane3140x100224f0
                            mv_image_copy_plane_uc_from3150x10022390
                            mv_image_copy_to_buffer3160x10023350
                            mv_image_copy_uc_from3170x10022af0
                            mv_image_fill_arrays3180x10022fe0
                            mv_image_fill_black3190x10023620
                            mv_image_fill_linesizes3200x100215d0
                            mv_image_fill_max_pixsteps3210x10021380
                            mv_image_fill_plane_sizes3220x100219b0
                            mv_image_fill_pointers3230x10021af0
                            mv_image_get_buffer_size3240x10023180
                            mv_image_get_linesize3250x10021480
                            mv_int2i3260x10024f80
                            mv_int_list_length_for_size3270x1008cda0
                            mv_lfg_init3280x100a7ee0
                            mv_lfg_init_from_data3290x10025100
                            mv_log3300x10026560
                            mv_log23310x10024fc0
                            mv_log2_16bit3320x10024fd0
                            mv_log2_i3330x10023dd0
                            mv_log_default_callback3340x10025b10
                            mv_log_format_line3350x10026550
                            mv_log_format_line23360x10026250
                            mv_log_get_flags3370x10026710
                            mv_log_get_level3380x100266e0
                            mv_log_once3390x100265d0
                            mv_log_set_callback3400x10026720
                            mv_log_set_flags3410x10026700
                            mv_log_set_level3420x100266f0
                            mv_lzo1x_decode3430x10026870
                            mv_malloc3440x10028d50
                            mv_malloc_array3450x10028ec0
                            mv_mallocz3460x10029100
                            mv_mallocz_array3470x10028f20
                            mv_mastering_display_metadata_alloc3480x10026f40
                            mv_mastering_display_metadata_create_side_data3490x10026f60
                            mv_match_list3500x100075a0
                            mv_match_name3510x10007100
                            mv_max_alloc3520x10028d40
                            mv_md5_alloc3530x10028790
                            mv_md5_final3540x100289f0
                            mv_md5_init3550x100287b0
                            mv_md5_size3560x100b7208
                            mv_md5_sum3570x10028b00
                            mv_md5_update3580x100287e0
                            mv_memcpy_backptr3590x10029830
                            mv_memdup3600x100294a0
                            mv_mod_i3610x100243c0
                            mv_mul_i3620x10023e60
                            mv_mul_q3630x100358c0
                            mv_murmur3_alloc3640x10029fc0
                            mv_murmur3_final3650x1002a800
                            mv_murmur3_init3660x1002a0d0
                            mv_murmur3_init_seeded3670x10029fe0
                            mv_murmur3_update3680x1002a1b0
                            mv_nearer_q3690x10035ca0
                            mv_opt_child_class_iterate3700x100303a0
                            mv_opt_child_next3710x10030380
                            mv_opt_copy3720x10030430
                            mv_opt_eval_double3730x1002f620
                            mv_opt_eval_flags3740x1002f520
                            mv_opt_eval_float3750x1002f5e0
                            mv_opt_eval_int3760x1002f560
                            mv_opt_eval_int643770x1002f5a0
                            mv_opt_eval_q3780x1002f660
                            mv_opt_find3790x1002ee70
                            mv_opt_find23800x1002ec60
                            mv_opt_flag_is_set3810x100302d0
                            mv_opt_free3820x1002ebd0
                            mv_opt_freep_ranges3830x10030760
                            mv_opt_get3840x1002d870
                            mv_opt_get_channel_layout3850x1002e4c0
                            mv_opt_get_chlayout3860x1002e550
                            mv_opt_get_dict_val3870x1002e5e0
                            mv_opt_get_double3880x1002df00
                            mv_opt_get_image_size3890x1002e1a0
                            mv_opt_get_int3900x1002dd90
                            mv_opt_get_key_value3910x1002ea50
                            mv_opt_get_pixel_fmt3920x1002e3c0
                            mv_opt_get_q3930x1002e010
                            mv_opt_get_sample_fmt3940x1002e440
                            mv_opt_get_video_rate3950x1002e230
                            mv_opt_is_set_to_default3960x10030800
                            mv_opt_is_set_to_default_by_name3970x10030d80
                            mv_opt_next3980x1002c760
                            mv_opt_ptr3990x100303c0
                            mv_opt_query_ranges4000x10030700
                            mv_opt_query_ranges_default4010x1002b9f0
                            mv_opt_serialize4020x10030dd0
                            mv_opt_set4030x1002f6a0
                            mv_opt_set_bin4040x1002cfc0
                            mv_opt_set_channel_layout4050x1002d730
                            mv_opt_set_chlayout4060x1002d820
                            mv_opt_set_defaults4070x1002ea30
                            mv_opt_set_defaults24080x1002e6b0
                            mv_opt_set_dict4090x100302a0
                            mv_opt_set_dict24100x10030180
                            mv_opt_set_dict_val4110x1002d7b0
                            mv_opt_set_double4120x1002c9d0
                            mv_opt_set_from_string4130x1002ff20
                            mv_opt_set_image_size4140x1002d120
                            mv_opt_set_int4150x1002c7b0
                            mv_opt_set_pixel_fmt4160x1002d510
                            mv_opt_set_q4170x1002ccc0
                            mv_opt_set_sample_fmt4180x1002d620
                            mv_opt_set_video_rate4190x1002d1e0
                            mv_opt_show24200x1002e640
                            mv_parse_color4210x10031420
                            mv_parse_cpu_caps4220x1000f8b0
                            mv_parse_ratio4230x100310f0
                            mv_parse_time4240x10031c30
                            mv_parse_video_rate4250x100312c0
                            mv_parse_video_size4260x10031200
                            mv_pix_fmt_count_planes4270x10034870
                            mv_pix_fmt_desc_get4280x10034790
                            mv_pix_fmt_desc_get_id4290x10034800
                            mv_pix_fmt_desc_next4300x100347c0
                            mv_pix_fmt_get_chroma_sub_sample4310x10034830
                            mv_pix_fmt_swap_endianness4320x10034920
                            mv_pixelutils_get_sad_fn4330x10035000
                            mv_q2intfloat4340x10036090
                            mv_rc4_alloc4350x100363e0
                            mv_rc4_crypt4360x100364e0
                            mv_rc4_init4370x10036400
                            mv_read_image_line4380x100339c0
                            mv_read_image_line24390x10033270
                            mv_realloc4400x10028da0
                            mv_realloc_array4410x10029010
                            mv_realloc_f4420x10028de0
                            mv_reallocp4430x10028e40
                            mv_reallocp_array4440x10029050
                            mv_reduce4450x100353b0
                            mv_rescale4460x10027760
                            mv_rescale_delta4470x10027a80
                            mv_rescale_q4480x100277e0
                            mv_rescale_q_rnd4490x100277b0
                            mv_rescale_rnd4500x10027220
                            mv_ripemd_alloc4510x1003c470
                            mv_ripemd_final4520x1003c6e0
                            mv_ripemd_init4530x100a7f8c
                            mv_ripemd_size4540x100bf9a4
                            mv_ripemd_update4550x1003c490
                            mv_sample_fmt_is_planar4560x1003cb70
                            mv_samples_alloc4570x1003ce40
                            mv_samples_alloc_array_and_samples4580x1003d010
                            mv_samples_copy4590x1003d270
                            mv_samples_fill_arrays4600x1003ccd0
                            mv_samples_get_buffer_size4610x1003cb90
                            mv_samples_set_silence4620x1003d450
                            mv_set_options_string4630x1002fd50
                            mv_sha512_alloc4640x1004c260
                            mv_sha512_final4650x1004c4c0
                            mv_sha512_init4660x100a81b0
                            mv_sha512_size4670x100bfaec
                            mv_sha512_update4680x1004c280
                            mv_sha_alloc4690x100411a0
                            mv_sha_final4700x10041410
                            mv_sha_init4710x100a80b4
                            mv_sha_size4720x100bfae4
                            mv_sha_update4730x100411c0
                            mv_shr_i4740x10024280
                            mv_size_mult4750x10029fa0
                            mv_small_strptime4760x10031790
                            mv_spherical_alloc4770x1004d120
                            mv_spherical_from_name4780x1004d280
                            mv_spherical_projection_name4790x1004d260
                            mv_spherical_tile_bounds4800x1004d150
                            mv_sscanf4810x10002f80
                            mv_stereo3d_alloc4820x1004d2d0
                            mv_stereo3d_create_side_data4830x1004d2f0
                            mv_stereo3d_from_name4840x1004d360
                            mv_stereo3d_type_name4850x1004d340
                            mv_strcasecmp4860x10006b30
                            mv_strdup4870x100292e0
                            mv_strerror4880x10013b30
                            mv_strireplace4890x10006bf0
                            mv_stristart4900x10006580
                            mv_stristr4910x100065f0
                            mv_strlcat4920x10006750
                            mv_strlcatf4930x100067f0
                            mv_strlcpy4940x100066e0
                            mv_strncasecmp4950x10006b80
                            mv_strndup4960x100293b0
                            mv_strnstr4970x10006660
                            mv_strstart4980x10006530
                            mv_strtod4990x100150e0
                            mv_strtok5000x10006aa0
                            mv_sub_i5010x10023d00
                            mv_sub_q5020x10035a10
                            mv_tea_alloc5030x1004d460
                            mv_tea_crypt5040x1004d4b0
                            mv_tea_init5050x1004d480
                            mv_tea_size5060x100bfc60
                            mv_tempfile5070x100195a0
                            mv_thread_message_flush5080x1004db40
                            mv_thread_message_queue_alloc5090x1004d700
                            mv_thread_message_queue_free5100x1004d7d0
                            mv_thread_message_queue_nb_elems5110x1004d880
                            mv_thread_message_queue_recv5120x1004d9b0
                            mv_thread_message_queue_send5130x1004d8d0
                            mv_thread_message_queue_set_err_recv5140x1004daf0
                            mv_thread_message_queue_set_err_send5150x1004daa0
                            mv_thread_message_queue_set_free_func5160x1004d7c0
                            mv_timecode_adjust_ntsc_framenum25170x1004dd30
                            mv_timecode_check_frame_rate5180x1004e8c0
                            mv_timecode_get_smpte5190x1004e080
                            mv_timecode_get_smpte_from_framenum5200x1004ddd0
                            mv_timecode_init5210x1004e930
                            mv_timecode_init_from_components5220x1004ea50
                            mv_timecode_init_from_string5230x1004ec80
                            mv_timecode_make_mpeg_tc_string5240x1004e850
                            mv_timecode_make_smpte_tc_string5250x1004e720
                            mv_timecode_make_smpte_tc_string25260x1004e520
                            mv_timecode_make_string5270x1004e270
                            mv_timegm5280x10031b50
                            mv_tree_destroy5290x1004f8f0
                            mv_tree_enumerate5300x1004fad0
                            mv_tree_find5310x1004ef60
                            mv_tree_insert5320x1004f020
                            mv_tree_node_alloc5330x1004ef40
                            mv_tree_node_size5340x100bfd80
                            mv_twofish_alloc5350x10050090
                            mv_twofish_crypt5360x100500b0
                            mv_twofish_init5370x100a8637
                            mv_twofish_size5380x100bfda0
                            mv_tx_init5390x100a9843
                            mv_tx_uninit5400x100a8f2b
                            mv_usleep5410x1004dc70
                            mv_utf8_decode5420x10007270
                            mv_util_ffversion5430x100c3fa0
                            mv_uuid_parse5440x1008d110
                            mv_uuid_parse_range5450x1008cff0
                            mv_uuid_unparse5460x1008d160
                            mv_uuid_urn_parse5470x1008d3e0
                            mv_vbprintf5480x10008b70
                            mv_version_info5490x1008d440
                            mv_video_enc_params_alloc5500x1008d480
                            mv_video_enc_params_create_side_data5510x1008d500
                            mv_vk_frame_alloc5520x10021370
                            mv_vkfmt_from_pixfmt5530x10021360
                            mv_vlog5540x10026650
                            mv_write_image_line5550x10034210
                            mv_write_image_line25560x10033e70
                            mv_xtea_alloc5570x10090760
                            mv_xtea_crypt5580x100907d0
                            mv_xtea_init5590x10090780
                            mv_xtea_le_crypt5600x10090910
                            mv_xtea_le_init5610x100907b0
                            mvpriv_alloc_fixed_dsp5620x10019fa0
                            mvpriv_cga_font5630x100c59e0
                            mvpriv_dict_set_timestamp5640x10012370
                            mvpriv_float_dsp_alloc5650x100a7b20
                            mvpriv_fopen_utf85660x10019a90
                            mvpriv_get_gamma_from_trc5670x1000f7d0
                            mvpriv_get_trc_function_from_trc5680x1000f800
                            mvpriv_init_lls5690x100a7f58
                            mvpriv_open5700x100195e0
                            mvpriv_report_missing_feature5710x100267e0
                            mvpriv_request_sample5720x10026730
                            mvpriv_scalarproduct_float_c5730x1001a2e0
                            mvpriv_set_systematic_pal25740x10021bf0
                            mvpriv_slicethread_create5750x1004ce50
                            mvpriv_slicethread_execute5760x1004cb50
                            mvpriv_slicethread_free5770x1004cd20
                            mvpriv_solve_lls5780x10025270
                            mvpriv_tempfile5790x10019970
                            mvpriv_vga16_font5800x100c49e0
                            mvutil_configuration5810x1008d460
                            mvutil_license5820x1008d470
                            next5830x1001db90
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            May 31, 2023 02:02:18.646944046 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:18.647016048 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:18.647125006 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:18.651449919 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:18.651478052 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:19.018131971 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:19.018373966 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:19.178318977 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:19.178364038 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:19.178913116 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:19.179338932 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:19.180795908 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:19.224298954 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:19.289669991 CEST4434973168.87.41.40192.168.2.5
                            May 31, 2023 02:02:19.289937019 CEST49731443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.453497887 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.453552008 CEST4434973368.87.41.40192.168.2.5
                            May 31, 2023 02:02:21.453629971 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.453917027 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.453924894 CEST4434973368.87.41.40192.168.2.5
                            May 31, 2023 02:02:21.803229094 CEST4434973368.87.41.40192.168.2.5
                            May 31, 2023 02:02:21.805675030 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.806556940 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.806576967 CEST4434973368.87.41.40192.168.2.5
                            May 31, 2023 02:02:21.809112072 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:21.809139013 CEST4434973368.87.41.40192.168.2.5
                            May 31, 2023 02:02:21.916466951 CEST4434973368.87.41.40192.168.2.5
                            May 31, 2023 02:02:21.919207096 CEST49733443192.168.2.568.87.41.40
                            May 31, 2023 02:02:22.575843096 CEST49736443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:22.575916052 CEST44349736124.122.47.148192.168.2.5
                            May 31, 2023 02:02:22.576016903 CEST49736443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:22.576513052 CEST49736443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:22.576544046 CEST44349736124.122.47.148192.168.2.5
                            May 31, 2023 02:02:25.788850069 CEST44349736124.122.47.148192.168.2.5
                            May 31, 2023 02:02:26.058224916 CEST49737443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:26.058284044 CEST44349737124.122.47.148192.168.2.5
                            May 31, 2023 02:02:26.058365107 CEST49737443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:26.060563087 CEST49737443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:26.060600042 CEST44349737124.122.47.148192.168.2.5
                            May 31, 2023 02:02:28.838704109 CEST44349737124.122.47.148192.168.2.5
                            May 31, 2023 02:02:28.839582920 CEST49738443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.839632988 CEST44349738124.122.47.148192.168.2.5
                            May 31, 2023 02:02:28.840126991 CEST49738443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.840204000 CEST49738443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.840249062 CEST44349738124.122.47.148192.168.2.5
                            May 31, 2023 02:02:28.840331078 CEST49738443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.845007896 CEST49739443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.845082045 CEST44349739124.122.47.148192.168.2.5
                            May 31, 2023 02:02:28.845304966 CEST49739443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.846070051 CEST49739443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:28.846101999 CEST44349739124.122.47.148192.168.2.5
                            May 31, 2023 02:02:32.038935900 CEST44349739124.122.47.148192.168.2.5
                            May 31, 2023 02:02:32.040954113 CEST49740443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:32.041023016 CEST44349740124.122.47.148192.168.2.5
                            May 31, 2023 02:02:32.041162968 CEST49740443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:32.041806936 CEST49740443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:32.041827917 CEST44349740124.122.47.148192.168.2.5
                            May 31, 2023 02:02:35.102032900 CEST44349740124.122.47.148192.168.2.5
                            May 31, 2023 02:02:35.103128910 CEST49741443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:35.103169918 CEST44349741124.122.47.148192.168.2.5
                            May 31, 2023 02:02:35.103255033 CEST49741443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:35.103368998 CEST49741443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:35.103405952 CEST44349741124.122.47.148192.168.2.5
                            May 31, 2023 02:02:35.103456974 CEST49741443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:37.121635914 CEST49742443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:37.121701956 CEST44349742124.122.47.148192.168.2.5
                            May 31, 2023 02:02:37.121778011 CEST49742443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:37.122220039 CEST49742443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:37.122242928 CEST44349742124.122.47.148192.168.2.5
                            May 31, 2023 02:02:38.299043894 CEST44349742124.122.47.148192.168.2.5
                            May 31, 2023 02:02:38.303081036 CEST49743443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:38.303142071 CEST44349743124.122.47.148192.168.2.5
                            May 31, 2023 02:02:38.303263903 CEST49743443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:38.303643942 CEST49743443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:38.303658962 CEST44349743124.122.47.148192.168.2.5
                            May 31, 2023 02:02:41.338814974 CEST44349743124.122.47.148192.168.2.5
                            May 31, 2023 02:02:41.339780092 CEST49744443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.339833975 CEST44349744124.122.47.148192.168.2.5
                            May 31, 2023 02:02:41.339911938 CEST49744443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.340133905 CEST49744443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.340182066 CEST44349744124.122.47.148192.168.2.5
                            May 31, 2023 02:02:41.340274096 CEST49744443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.343740940 CEST49745443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.343780994 CEST44349745124.122.47.148192.168.2.5
                            May 31, 2023 02:02:41.343873024 CEST49745443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.344304085 CEST49745443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:41.344316959 CEST44349745124.122.47.148192.168.2.5
                            May 31, 2023 02:02:44.378490925 CEST44349745124.122.47.148192.168.2.5
                            May 31, 2023 02:02:44.379211903 CEST49746443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:44.379277945 CEST44349746124.122.47.148192.168.2.5
                            May 31, 2023 02:02:44.379360914 CEST49746443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:44.381783009 CEST49746443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:44.381829977 CEST44349746124.122.47.148192.168.2.5
                            May 31, 2023 02:02:47.578855038 CEST44349746124.122.47.148192.168.2.5
                            May 31, 2023 02:02:47.584633112 CEST49747443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:47.584695101 CEST44349747124.122.47.148192.168.2.5
                            May 31, 2023 02:02:47.584842920 CEST49747443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:47.584963083 CEST49747443192.168.2.5124.122.47.148
                            May 31, 2023 02:02:47.588301897 CEST44349747124.122.47.148192.168.2.5
                            May 31, 2023 02:02:47.593269110 CEST44349747124.122.47.148192.168.2.5
                            TimestampSource PortDest PortSource IPDest IP
                            May 31, 2023 02:02:18.465459108 CEST5922053192.168.2.58.8.8.8
                            May 31, 2023 02:02:18.638864994 CEST53592208.8.8.8192.168.2.5
                            May 31, 2023 02:02:19.295789957 CEST5506853192.168.2.58.8.8.8
                            TimestampSource IPDest IPChecksumCodeType
                            May 31, 2023 02:02:55.646030903 CEST85.57.212.13192.168.2.5e919(Host unreachable)Destination Unreachable
                            May 31, 2023 02:02:58.656105042 CEST85.57.212.13192.168.2.5e919(Host unreachable)Destination Unreachable
                            May 31, 2023 02:03:04.658116102 CEST85.57.212.13192.168.2.5e919(Host unreachable)Destination Unreachable
                            May 31, 2023 02:03:10.740196943 CEST85.57.212.13192.168.2.5e919(Host unreachable)Destination Unreachable
                            May 31, 2023 02:03:14.767111063 CEST85.57.212.13192.168.2.5e919(Host unreachable)Destination Unreachable
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            May 31, 2023 02:02:18.465459108 CEST192.168.2.58.8.8.80xb38eStandard query (0)xfinity.comA (IP address)IN (0x0001)false
                            May 31, 2023 02:02:19.295789957 CEST192.168.2.58.8.8.80xb2e3Standard query (0)www.xfinity.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            May 31, 2023 02:02:18.638864994 CEST8.8.8.8192.168.2.50xb38eNo error (0)xfinity.com68.87.41.40A (IP address)IN (0x0001)false
                            May 31, 2023 02:02:18.638864994 CEST8.8.8.8192.168.2.50xb38eNo error (0)xfinity.com96.114.21.40A (IP address)IN (0x0001)false
                            May 31, 2023 02:02:18.638864994 CEST8.8.8.8192.168.2.50xb38eNo error (0)xfinity.com96.114.14.140A (IP address)IN (0x0001)false
                            May 31, 2023 02:02:19.331722975 CEST8.8.8.8192.168.2.50xb2e3No error (0)www.xfinity.comwww.xfinity.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
                            • xfinity.com

                            Click to jump to process

                            Target ID:0
                            Start time:01:59:07
                            Start date:31/05/2023
                            Path:C:\Windows\System32\loaddll32.exe
                            Wow64 process (32bit):true
                            Commandline:loaddll32.exe "C:\Users\user\Desktop\F072.dll"
                            Imagebase:0x2e0000
                            File size:126464 bytes
                            MD5 hash:3B4636AE519868037940CA5C4272091B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            Target ID:1
                            Start time:01:59:07
                            Start date:31/05/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7fcd70000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:01:59:07
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
                            Imagebase:0x11d0000
                            File size:232960 bytes
                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:3
                            Start time:01:59:07
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_i
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:4
                            Start time:01:59:07
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",#1
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:8
                            Start time:01:59:08
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 664
                            Imagebase:0x910000
                            File size:434592 bytes
                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:9
                            Start time:01:59:08
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5240 -s 664
                            Imagebase:0x910000
                            File size:434592 bytes
                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:10
                            Start time:01:59:10
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_q
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:11
                            Start time:01:59:13
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\F072.dll,mv_add_stable
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:13
                            Start time:01:59:13
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5708 -s 652
                            Imagebase:0x910000
                            File size:434592 bytes
                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:14
                            Start time:01:59:16
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_i
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:15
                            Start time:01:59:16
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_q
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:16
                            Start time:01:59:16
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",mv_add_stable
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:17
                            Start time:01:59:16
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",next
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000011.00000002.418718397.0000000004980000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000011.00000002.418554458.0000000002C3A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                            Target ID:18
                            Start time:01:59:16
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_license
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:19
                            Start time:01:59:16
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\F072.dll",mvutil_configuration
                            Imagebase:0x9a0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:22
                            Start time:01:59:17
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 652
                            Imagebase:0x910000
                            File size:434592 bytes
                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:23
                            Start time:01:59:17
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 652
                            Imagebase:0x910000
                            File size:434592 bytes
                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:24
                            Start time:01:59:20
                            Start date:31/05/2023
                            Path:C:\Windows\SysWOW64\wermgr.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\wermgr.exe
                            Imagebase:0x1080000
                            File size:191904 bytes
                            MD5 hash:CCF15E662ED5CE77B5FF1A7AAE305233
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            No disassembly