Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ProjectFunding_450726_Jun01.js

Overview

General Information

Sample Name:ProjectFunding_450726_Jun01.js
Analysis ID:880006
MD5:a657553449746c482dacfe3b19119b7a
SHA1:630b815d443f8f7ef7e4c4c7c100de1cd8a7ed53
SHA256:44e029dd6210c4906a82e1f16dd5ebed434efd225dafb92fc560e6ff6d1ee948
Tags:js
Infos:

Detection

Qbot
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
Java / VBScript file with very long strings (likely obfuscated code)
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Launches processes in debugging mode, may be used to hinder debugging
Checks for available system drives (often done to infect USB drives)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

  • System is w10x64
  • wscript.exe (PID: 7068 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ProjectFunding_450726_Jun01.js" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • msiexec.exe (PID: 492 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 4767B71A318E201188A0D0A420C8B608)
    • rundll32.exe (PID: 5176 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 5620 cmdline: rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • wermgr.exe (PID: 4744 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: CCF15E662ED5CE77B5FF1A7AAE305233)
    • wscript.exe (PID: 5156 cmdline: wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "obama266", "Campaign": "1685611378", "Version": "404.1346", "C2 list": ["24.234.220.88:990", "70.28.50.223:2078", "96.56.197.26:2083", "103.123.223.133:443", "83.249.198.100:2222", "199.27.66.213:443", "90.104.151.37:2222", "94.204.202.106:443", "72.205.104.134:443", "65.95.141.84:2222", "70.28.50.223:2078", "82.131.141.209:443", "77.126.99.230:443", "71.38.155.217:443", "205.237.67.69:995", "84.215.202.8:443", "24.234.220.88:465", "76.178.148.107:2222", "116.74.163.130:443", "70.28.50.223:2087", "147.147.30.126:2222", "173.88.135.179:443", "103.140.174.20:2222", "77.86.98.236:443", "92.149.250.113:2222", "96.87.28.170:2222", "86.168.210.41:443", "176.142.207.63:443", "12.172.173.82:32101", "86.132.236.117:443", "70.50.83.216:2222", "161.142.103.187:995", "45.62.70.33:443", "12.172.173.82:465", "178.175.187.254:443", "83.110.223.61:443", "105.184.209.194:995", "41.186.88.38:443", "102.156.10.183:443", "27.109.19.90:2078", "47.205.25.170:443", "12.172.173.82:993", "76.170.252.153:995", "69.242.31.249:443", "24.234.220.88:995", "125.99.69.178:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "124.122.47.148:443", "81.229.117.95:2222", "98.145.23.67:443", "114.143.176.236:443", "103.144.201.48:2078", "122.186.210.254:443", "69.160.121.6:61201", "12.172.173.82:21", "72.253.126.216:443", "75.109.111.89:443", "76.86.31.59:443", "116.120.145.170:995", "12.172.173.82:50001", "81.101.185.146:443", "201.244.108.183:995", "68.203.69.96:443", "103.139.242.6:443", "103.42.86.42:995", "85.61.165.153:2222", "76.16.49.134:443", "125.99.76.102:443", "184.182.66.109:443", "70.28.50.223:32100", "50.68.204.71:993", "85.57.212.13:3389", "41.227.190.59:443", "70.28.50.223:3389", "31.53.29.235:2222", "89.79.229.50:443", "50.68.186.195:443", "47.199.241.39:443", "93.147.235.8:443", "75.141.227.169:443", "45.243.142.31:995", "79.92.15.6:443", "85.104.105.67:443", "89.129.109.27:2222", "86.176.83.44:2222", "24.234.220.88:993", "89.32.156.5:995", "12.172.173.82:22", "103.101.203.177:443", "70.28.50.223:2083", "98.187.21.2:443", "70.49.205.198:2222", "96.56.197.26:2222", "92.9.45.20:2222", "86.195.14.72:2222", "172.115.17.50:443", "100.4.163.158:2222", "80.12.88.148:2222", "213.64.33.92:2222", "113.11.92.30:443", "78.192.109.105:2222", "47.34.30.133:443", "122.184.143.86:443", "198.2.51.242:993", "165.120.169.171:2222", "88.126.94.4:50000", "82.125.44.236:2222", "117.195.17.148:993", "147.219.4.194:443", "80.167.196.79:443", "92.154.17.149:2222", "184.181.75.148:443", "95.45.50.93:2222", "84.35.26.14:995", "201.143.215.69:443", "12.172.173.82:2087", "50.68.204.71:443", "64.121.161.102:443"]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.400127832.0000000004C30000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000004.00000002.400000830.0000000000ECA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        4.2.rundll32.exe.ee0950.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xe055:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0x9c7b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        4.2.rundll32.exe.ee0950.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          4.2.rundll32.exe.fd0000.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          4.2.rundll32.exe.fd0000.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            4.2.rundll32.exe.ee0950.0.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.400000830.0000000000ECA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "obama266", "Campaign": "1685611378", "Version": "404.1346", "C2 list": ["24.234.220.88:990", "70.28.50.223:2078", "96.56.197.26:2083", "103.123.223.133:443", "83.249.198.100:2222", "199.27.66.213:443", "90.104.151.37:2222", "94.204.202.106:443", "72.205.104.134:443", "65.95.141.84:2222", "70.28.50.223:2078", "82.131.141.209:443", "77.126.99.230:443", "71.38.155.217:443", "205.237.67.69:995", "84.215.202.8:443", "24.234.220.88:465", "76.178.148.107:2222", "116.74.163.130:443", "70.28.50.223:2087", "147.147.30.126:2222", "173.88.135.179:443", "103.140.174.20:2222", "77.86.98.236:443", "92.149.250.113:2222", "96.87.28.170:2222", "86.168.210.41:443", "176.142.207.63:443", "12.172.173.82:32101", "86.132.236.117:443", "70.50.83.216:2222", "161.142.103.187:995", "45.62.70.33:443", "12.172.173.82:465", "178.175.187.254:443", "83.110.223.61:443", "105.184.209.194:995", "41.186.88.38:443", "102.156.10.183:443", "27.109.19.90:2078", "47.205.25.170:443", "12.172.173.82:993", "76.170.252.153:995", "69.242.31.249:443", "24.234.220.88:995", "125.99.69.178:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "124.122.47.148:443", "81.229.117.95:2222", "98.145.23.67:443", "114.143.176.236:443", "103.144.201.48:2078", "122.186.210.254:443", "69.160.121.6:61201", "12.172.173.82:21", "72.253.126.216:443", "75.109.111.89:443", "76.86.31.59:443", "116.120.145.170:995", "12.172.173.82:50001", "81.101.185.146:443", "201.244.108.183:995", "68.203.69.96:443", "103.139.242.6:443", "103.42.86.42:995", "85.61.165.153:2222", "76.16.49.134:443", "125.99.76.102:443", "184.182.66.109:443", "70.28.50.223:32100", "50.68.204.71:993", "85.57.212.13:3389", "41.227.190.59:443", "70.28.50.223:3389", "31.53.29.235:2222", "89.79.229.50:443", "50.68.186.195:443", "47.199.241.39:443", "93.147.235.8:443", "75.141.227.169:443", "45.243.142.31:995", "79.92.15.6:443", "85.104.105.67:443", "89.129.109.27:2222", "86.176.83.44:2222", "24.234.220.88:993", "89.32.156.5:995", "12.172.173.82:22", "103.101.203.177:443", "70.28.50.223:2083", "98.187.21.2:443", "70.49.205.198:2222", "96.56.197.26:2222", "92.9.45.20:2222", "86.195.14.72:2222", "172.115.17.50:443", "100.4.163.158:2222", "80.12.88.148:2222", "213.64.33.92:2222", "113.11.92.30:443", "78.192.109.105:2222", "47.34.30.133:443", "122.184.143.86:443", "198.2.51.242:993", "165.120.169.171:2222", "88.126.94.4:50000", "82.125.44.236:2222", "117.195.17.148:993", "147.219.4.194:443", "80.167.196.79:443", "92.154.17.149:2222", "184.181.75.148:443", "95.45.50.93:2222", "84.35.26.14:995", "201.143.215.69:443", "12.172.173.82:2087", "50.68.204.71:443", "64.121.161.102:443"]}
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: netstat -nao
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: runas
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ipconfig /all
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: net localgroup
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Microsoft
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELF_TEST_1
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: p%08x
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Self test FAILED!!!
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Self test OK.
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: /t5
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: whoami /all
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: cmd
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: route print
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .lnk
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: arp -a
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: net share
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: cmd.exe /c set
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Self check
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %u;%u;%u;
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ProfileImagePath
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ProgramData
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Self check ok!
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: powershell.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: qwinsta
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: net view
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Component_08
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Start screenshot
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: appidapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: c:\ProgramData
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Component_07
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: powershell.exe -encodedCommand
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: netstat -nao
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: runas
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ipconfig /all
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SystemRoot
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: cscript.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: image/jpeg
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: LocalLow
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: displayName
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: shlwapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CommandLine
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: kernel32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: 1234567890
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wbj.go
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_DiskDrive
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: System32
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Name
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: WRSA.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: c:\\
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SpyNetReporting
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: FALSE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aswhookx.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Packages
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: RepUx.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Winsta0
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: root\SecurityCenter2
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: MsMpEng.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: userenv.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: csc_ui.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: \\.\pipe\
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: pstorec.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: NTUSER.DAT
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: from
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: netapi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: gdi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: setupapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: iphlpapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CrAmTray.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: user32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: \sf2.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Software\Microsoft
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %S.%06d
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: bcrypt.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wtsapi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: shell32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: TRUE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_Bios
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: */*
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ByteFence.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: type=0x%04X
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ROOT\CIMV2
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: https
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: fshoster32.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: kernelbase.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: regsvr32.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %s\system32\
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_Process
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: rundll32.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: LOCALAPPDATA
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: cmd.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: APPDATA
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: select
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: mcshield.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: advapi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ws2_32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .cfg
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_Product
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: WQL
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wininet.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: LastBootUpTime
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: urlmon.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Create
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_PnPEntity
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Initializing database...
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: winsta0\default
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .dat
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: WBJ_IGNORE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: next
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wpcap.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: image/pjpeg
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: fmon.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: vbs
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aswhooka.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SysWOW64
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: mpr.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: image/gif
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: crypt32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ntdll.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: open
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SystemRoot
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: cscript.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: image/jpeg
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: LocalLow
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: displayName
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: shlwapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CommandLine
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: kernel32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: 1234567890
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wbj.go
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_DiskDrive
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: System32
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Name
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: WRSA.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: c:\\
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SpyNetReporting
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: FALSE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aswhookx.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Packages
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: RepUx.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Winsta0
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: root\SecurityCenter2
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: MsMpEng.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: userenv.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: csc_ui.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: \\.\pipe\
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: pstorec.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: NTUSER.DAT
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: from
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: netapi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: gdi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: setupapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: iphlpapi.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CrAmTray.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: user32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: \sf2.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Software\Microsoft
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %S.%06d
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: bcrypt.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wtsapi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: shell32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: TRUE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_Bios
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: */*
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ByteFence.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: type=0x%04X
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ROOT\CIMV2
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: https
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: fshoster32.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: kernelbase.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: regsvr32.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %s\system32\
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_Process
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: rundll32.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: LOCALAPPDATA
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: cmd.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: APPDATA
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: select
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: mcshield.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: advapi32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ws2_32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .cfg
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_Product
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: WQL
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wininet.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: LastBootUpTime
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: urlmon.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Create
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Win32_PnPEntity
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Initializing database...
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: winsta0\default
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: .dat
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: WBJ_IGNORE
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: next
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: wpcap.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: image/pjpeg
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: fmon.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: vbs
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: aswhooka.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: SysWOW64
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: mpr.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: image/gif
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: crypt32.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: ntdll.dll
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: open
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 4.2.rundll32.exe.fd0000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: unknownHTTPS traffic detected: 217.195.153.225:443 -> 192.168.2.5:49719 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 96.114.21.40:443 -> 192.168.2.5:49721 version: TLS 1.2
            Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000004.00000002.400246774.000000001006A000.00000002.00000001.01000000.00000006.sdmp, main.dll.1.dr
            Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000004.00000002.400246774.000000001006A000.00000002.00000001.01000000.00000006.sdmp, main.dll.1.dr
            Source: C:\Windows\System32\msiexec.exeFile opened: z:
            Source: C:\Windows\System32\msiexec.exeFile opened: x:
            Source: C:\Windows\System32\msiexec.exeFile opened: v:
            Source: C:\Windows\System32\msiexec.exeFile opened: t:
            Source: C:\Windows\System32\msiexec.exeFile opened: r:
            Source: C:\Windows\System32\msiexec.exeFile opened: p:
            Source: C:\Windows\System32\msiexec.exeFile opened: n:
            Source: C:\Windows\System32\msiexec.exeFile opened: l:
            Source: C:\Windows\System32\msiexec.exeFile opened: j:
            Source: C:\Windows\System32\msiexec.exeFile opened: h:
            Source: C:\Windows\System32\msiexec.exeFile opened: f:
            Source: C:\Windows\System32\msiexec.exeFile opened: b:
            Source: C:\Windows\System32\msiexec.exeFile opened: y:
            Source: C:\Windows\System32\msiexec.exeFile opened: w:
            Source: C:\Windows\System32\msiexec.exeFile opened: u:
            Source: C:\Windows\System32\msiexec.exeFile opened: s:
            Source: C:\Windows\System32\msiexec.exeFile opened: q:
            Source: C:\Windows\System32\msiexec.exeFile opened: o:
            Source: C:\Windows\System32\msiexec.exeFile opened: m:
            Source: C:\Windows\System32\msiexec.exeFile opened: k:
            Source: C:\Windows\System32\msiexec.exeFile opened: i:
            Source: C:\Windows\System32\msiexec.exeFile opened: g:
            Source: C:\Windows\System32\msiexec.exeFile opened: e:
            Source: C:\Windows\System32\wscript.exeFile opened: c:
            Source: C:\Windows\System32\msiexec.exeFile opened: a:

            Networking

            barindex
            Source: Malware configuration extractorIPs: 24.234.220.88:990
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 96.56.197.26:2083
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 83.249.198.100:2222
            Source: Malware configuration extractorIPs: 199.27.66.213:443
            Source: Malware configuration extractorIPs: 90.104.151.37:2222
            Source: Malware configuration extractorIPs: 94.204.202.106:443
            Source: Malware configuration extractorIPs: 72.205.104.134:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 82.131.141.209:443
            Source: Malware configuration extractorIPs: 77.126.99.230:443
            Source: Malware configuration extractorIPs: 71.38.155.217:443
            Source: Malware configuration extractorIPs: 205.237.67.69:995
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 24.234.220.88:465
            Source: Malware configuration extractorIPs: 76.178.148.107:2222
            Source: Malware configuration extractorIPs: 116.74.163.130:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 173.88.135.179:443
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 92.149.250.113:2222
            Source: Malware configuration extractorIPs: 96.87.28.170:2222
            Source: Malware configuration extractorIPs: 86.168.210.41:443
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 86.132.236.117:443
            Source: Malware configuration extractorIPs: 70.50.83.216:2222
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 45.62.70.33:443
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 178.175.187.254:443
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 105.184.209.194:995
            Source: Malware configuration extractorIPs: 41.186.88.38:443
            Source: Malware configuration extractorIPs: 102.156.10.183:443
            Source: Malware configuration extractorIPs: 27.109.19.90:2078
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 76.170.252.153:995
            Source: Malware configuration extractorIPs: 69.242.31.249:443
            Source: Malware configuration extractorIPs: 24.234.220.88:995
            Source: Malware configuration extractorIPs: 125.99.69.178:443
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 75.143.236.149:443
            Source: Malware configuration extractorIPs: 14.192.241.76:995
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 98.145.23.67:443
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 103.144.201.48:2078
            Source: Malware configuration extractorIPs: 122.186.210.254:443
            Source: Malware configuration extractorIPs: 69.160.121.6:61201
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 72.253.126.216:443
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 76.86.31.59:443
            Source: Malware configuration extractorIPs: 116.120.145.170:995
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 68.203.69.96:443
            Source: Malware configuration extractorIPs: 103.139.242.6:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 85.61.165.153:2222
            Source: Malware configuration extractorIPs: 76.16.49.134:443
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 50.68.204.71:993
            Source: Malware configuration extractorIPs: 85.57.212.13:3389
            Source: Malware configuration extractorIPs: 41.227.190.59:443
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 31.53.29.235:2222
            Source: Malware configuration extractorIPs: 89.79.229.50:443
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.199.241.39:443
            Source: Malware configuration extractorIPs: 93.147.235.8:443
            Source: Malware configuration extractorIPs: 75.141.227.169:443
            Source: Malware configuration extractorIPs: 45.243.142.31:995
            Source: Malware configuration extractorIPs: 79.92.15.6:443
            Source: Malware configuration extractorIPs: 85.104.105.67:443
            Source: Malware configuration extractorIPs: 89.129.109.27:2222
            Source: Malware configuration extractorIPs: 86.176.83.44:2222
            Source: Malware configuration extractorIPs: 24.234.220.88:993
            Source: Malware configuration extractorIPs: 89.32.156.5:995
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 103.101.203.177:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 98.187.21.2:443
            Source: Malware configuration extractorIPs: 70.49.205.198:2222
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 86.195.14.72:2222
            Source: Malware configuration extractorIPs: 172.115.17.50:443
            Source: Malware configuration extractorIPs: 100.4.163.158:2222
            Source: Malware configuration extractorIPs: 80.12.88.148:2222
            Source: Malware configuration extractorIPs: 213.64.33.92:2222
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 78.192.109.105:2222
            Source: Malware configuration extractorIPs: 47.34.30.133:443
            Source: Malware configuration extractorIPs: 122.184.143.86:443
            Source: Malware configuration extractorIPs: 198.2.51.242:993
            Source: Malware configuration extractorIPs: 165.120.169.171:2222
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 82.125.44.236:2222
            Source: Malware configuration extractorIPs: 117.195.17.148:993
            Source: Malware configuration extractorIPs: 147.219.4.194:443
            Source: Malware configuration extractorIPs: 80.167.196.79:443
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 84.35.26.14:995
            Source: Malware configuration extractorIPs: 201.143.215.69:443
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 50.68.204.71:443
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Joe Sandbox ViewASN Name: CHARTER-20115US CHARTER-20115US
            Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
            Source: Joe Sandbox ViewIP Address: 75.143.236.149 75.143.236.149
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cacheCookie: xpgn=1
            Source: global trafficTCP traffic: 192.168.2.5:49726 -> 105.184.209.194:995
            Source: unknownNetwork traffic detected: IP country count 32
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: unknownTCP traffic detected without corresponding DNS query: 105.184.209.194
            Source: national[1].htm.5.drString found in binary or memory: Find tutorials and demos\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca rel=\"nofollow\" href=\"https:\u002F\u002Fwww.facebook.com\u002Fxfinity\"\u003EFacebook equals www.facebook.com (Facebook)
            Source: wscript.exe, 00000000.00000002.392570780.000001C96BC1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392118030.000001C96BC1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.391972717.000001C96BBE8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392048669.000001C96BBF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%/%.msi%InstallProduct
            Source: 4fa97f.rbs.1.drString found in binary or memory: https://garokelka.com/
            Source: 4fa97f.rbs.1.drString found in binary or memory: https://garokelka.com/$
            Source: wscript.exe, 00000000.00000003.392048669.000001C96BC35000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392263721.000001C96BC35000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.392570780.000001C96BC35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://garokelka.com/yjxcii.msi
            Source: ~DF22471B5A50AA2E97.TMP.1.drString found in binary or memory: https://garokelka.com/yjxcii.msi-825014416310365950
            Source: ~DFB376DA478E956195.TMP.1.dr, inprogressinstallinfo.ipi.1.dr, ~DFBDB1CFA03CBC6FC5.TMP.1.dr, ~DF2A70DF5CEC56BF5D.TMP.1.dr, ~DF79B335FA0EB48BA5.TMP.1.dr, ~DF95BD744A4429F4FF.TMP.1.drString found in binary or memory: https://garokelka.com/yjxcii.msi0C:
            Source: wscript.exe, 00000000.00000002.392535316.000001C96BBF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.391972717.000001C96BBE8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392048669.000001C96BBF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://garokelka.com/yjxcii.msill.mui
            Source: national[1].htm.5.drString found in binary or memory: https://www.xfinity.com/learn/internet-service/acp
            Source: national[1].htm.5.drString found in binary or memory: https://www.xfinity.com/mobile/policies/broadband-disclosures
            Source: national[1].htm.5.drString found in binary or memory: https://www.xfinity.com/networkmanagement
            Source: unknownDNS traffic detected: queries for: garokelka.com
            Source: global trafficHTTP traffic detected: GET /yjxcii.msi HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows InstallerHost: garokelka.com
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cacheCookie: xpgn=1
            Source: unknownHTTPS traffic detected: 217.195.153.225:443 -> 192.168.2.5:49719 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 96.114.21.40:443 -> 192.168.2.5:49721 version: TLS 1.2
            Source: 4.2.rundll32.exe.ee0950.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 4.2.rundll32.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 4.2.rundll32.exe.ee0950.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\4fa980.msiJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI319E.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002B980
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10059B40
            Source: ProjectFunding_450726_Jun01.jsInitial sample: Strings found which are bigger than 50
            Source: C:\Windows\System32\wscript.exeSection loaded: tsappcmp.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ProjectFunding_450726_Jun01.js"
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPluginJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF22471B5A50AA2E97.TMPJump to behavior
            Source: classification engineClassification label: mal92.troj.evad.winJS@10/19@3/100
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{73B1D26A-63AE-4441-A78B-E87C4AC58080}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{9F22E6A9-49AA-41B0-8132-BBF5C96D0FE5}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9F22E6A9-49AA-41B0-8132-BBF5C96D0FE5}
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
            Source: wscript.exe, 00000000.00000002.392487359.000001C96BBD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBP
            Source: C:\Windows\System32\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000004.00000002.400246774.000000001006A000.00000002.00000001.01000000.00000006.sdmp, main.dll.1.dr
            Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000004.00000002.400246774.000000001006A000.00000002.00000001.01000000.00000006.sdmp, main.dll.1.dr
            Source: main.dll.1.drStatic PE information: real checksum: 0xc399f should be: 0xcbceb
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dllJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4744 base: DB3C50 value: E9 63 D7 DC FF
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: wermgr.exe, 00000005.00000003.424428035.0000000004C95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BEHAVIORDUMPER.EXE
            Source: wermgr.exe, 00000005.00000003.424428035.0000000004C95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BEHAVIORDUMPER.EXEU
            Source: wermgr.exe, 00000005.00000003.424428035.0000000004C95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE
            Source: wermgr.exe, 00000005.00000003.424428035.0000000004C95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXEU
            Source: C:\Windows\System32\msiexec.exe TID: 5420Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 5640Thread sleep count: 188 > 30
            Source: C:\Windows\SysWOW64\wermgr.exe TID: 4716Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.7 %
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100559A0 GetVersionExA,GetVersionExA,GetVersionExA,GetSystemInfo,
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1005C09A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_3_00FC2297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100379BC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1005C09A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: BB0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: B80000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: DB3C50
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: B80000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: BB0000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: B80000 value starts with: 4D5A
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100060D0 lgetVersion@Engine@ScScript@@SAHXZ,lgetStackTrace@DebugAPI@ScScript@@QBE?AVString@ScCore@@HH@Z,lgetName@Engine@ScScript@@QBEABVString@ScCore@@XZ,
            Source: rundll32.exe, 00000004.00000003.392256643.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: rundll32.exe, 00000004.00000003.392256643.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
            Source: rundll32.exe, 00000004.00000003.392256643.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: rundll32.exe, 00000004.00000003.392256643.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
            Source: rundll32.exe, 00000004.00000003.392256643.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: rundll32.exe, 00000004.00000003.392256643.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 4.2.rundll32.exe.ee0950.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.rundll32.exe.fd0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.rundll32.exe.ee0950.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.400127832.0000000004C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.400000830.0000000000ECA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 4.2.rundll32.exe.ee0950.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.rundll32.exe.fd0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.rundll32.exe.ee0950.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.400127832.0000000004C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.400000830.0000000000ECA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            21
            Scripting
            1
            DLL Side-Loading
            311
            Process Injection
            11
            Masquerading
            1
            Credential API Hooking
            12
            Security Software Discovery
            1
            Replication Through Removable Media
            1
            Credential API Hooking
            Exfiltration Over Other Network Medium11
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Ingress Tool Transfer
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
            Process Injection
            NTDS11
            Peripheral Device Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
            Scripting
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size Limits113
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Obfuscated Files or Information
            Cached Domain Credentials15
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Rundll32
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            File Deletion
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            ProjectFunding_450726_Jun01.js3%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://garokelka.com/yjxcii.msi0C:0%Avira URL Cloudsafe
            https://garokelka.com/yjxcii.msi-8250144163103659500%Avira URL Cloudsafe
            https://%/%.msi%InstallProduct0%Avira URL Cloudsafe
            https://garokelka.com/yjxcii.msill.mui0%Avira URL Cloudsafe
            https://garokelka.com/yjxcii.msi0%Avira URL Cloudsafe
            https://garokelka.com/$0%Avira URL Cloudsafe
            https://garokelka.com/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            xfinity.com
            96.114.21.40
            truefalse
              high
              garokelka.com
              217.195.153.225
              truefalse
                unknown
                www.xfinity.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://garokelka.com/yjxcii.msifalse
                  • Avira URL Cloud: safe
                  unknown
                  https://xfinity.com/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://garokelka.com/$4fa97f.rbs.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://garokelka.com/yjxcii.msi0C:~DFB376DA478E956195.TMP.1.dr, inprogressinstallinfo.ipi.1.dr, ~DFBDB1CFA03CBC6FC5.TMP.1.dr, ~DF2A70DF5CEC56BF5D.TMP.1.dr, ~DF79B335FA0EB48BA5.TMP.1.dr, ~DF95BD744A4429F4FF.TMP.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.xfinity.com/mobile/policies/broadband-disclosuresnational[1].htm.5.drfalse
                      high
                      https://www.xfinity.com/learn/internet-service/acpnational[1].htm.5.drfalse
                        high
                        https://www.xfinity.com/networkmanagementnational[1].htm.5.drfalse
                          high
                          https://garokelka.com/yjxcii.msi-825014416310365950~DF22471B5A50AA2E97.TMP.1.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://%/%.msi%InstallProductwscript.exe, 00000000.00000002.392570780.000001C96BC1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392118030.000001C96BC1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.391972717.000001C96BBE8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392048669.000001C96BBF7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://garokelka.com/yjxcii.msill.muiwscript.exe, 00000000.00000002.392535316.000001C96BBF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.391972717.000001C96BBE8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.392048669.000001C96BBF7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://garokelka.com/4fa97f.rbs.1.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          75.143.236.149
                          unknownUnited States
                          20115CHARTER-20115UStrue
                          83.110.223.61
                          unknownUnited Arab Emirates
                          5384EMIRATES-INTERNETEmiratesInternetAEtrue
                          86.195.14.72
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          84.215.202.8
                          unknownNorway
                          41164GET-NOGETNorwayNOtrue
                          184.182.66.109
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          80.167.196.79
                          unknownDenmark
                          3292TDCTDCASDKtrue
                          125.99.69.178
                          unknownIndia
                          17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                          89.32.156.5
                          unknownItaly
                          48544TECNOADSL-ASITtrue
                          161.142.103.187
                          unknownMalaysia
                          9930TTNET-MYTIMEdotComBerhadMYtrue
                          213.64.33.92
                          unknownSweden
                          3301TELIANET-SWEDENTeliaCompanySEtrue
                          114.143.176.236
                          unknownIndia
                          17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
                          24.234.220.88
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          14.192.241.76
                          unknownMalaysia
                          9534MAXIS-AS1-APBinariangBerhadMYtrue
                          173.88.135.179
                          unknownUnited States
                          10796TWC-10796-MIDWESTUStrue
                          72.205.104.134
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          69.160.121.6
                          unknownJamaica
                          33576DIG001JMtrue
                          117.195.17.148
                          unknownIndia
                          9829BSNL-NIBNationalInternetBackboneINtrue
                          47.34.30.133
                          unknownUnited States
                          20115CHARTER-20115UStrue
                          70.49.205.198
                          unknownCanada
                          577BACOMCAtrue
                          184.181.75.148
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          84.35.26.14
                          unknownNetherlands
                          21221INFOPACT-ASTheNetherlandsNLtrue
                          41.227.190.59
                          unknownTunisia
                          2609TN-BB-ASTunisiaBackBoneASTNtrue
                          86.168.210.41
                          unknownUnited Kingdom
                          2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                          100.4.163.158
                          unknownUnited States
                          701UUNETUStrue
                          70.50.83.216
                          unknownCanada
                          577BACOMCAtrue
                          165.120.169.171
                          unknownUnited States
                          2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                          82.131.141.209
                          unknownHungary
                          20845DIGICABLEHUtrue
                          68.203.69.96
                          unknownUnited States
                          11427TWC-11427-TEXASUStrue
                          79.92.15.6
                          unknownFrance
                          15557LDCOMNETFRtrue
                          64.121.161.102
                          unknownUnited States
                          6079RCN-ASUStrue
                          96.56.197.26
                          unknownUnited States
                          6128CABLE-NET-1UStrue
                          178.175.187.254
                          unknownMoldova Republic of
                          43289TRABIAMDtrue
                          125.99.76.102
                          unknownIndia
                          17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                          81.101.185.146
                          unknownUnited Kingdom
                          5089NTLGBtrue
                          98.187.21.2
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          92.149.250.113
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          76.86.31.59
                          unknownUnited States
                          20001TWC-20001-PACWESTUStrue
                          147.147.30.126
                          unknownUnited Kingdom
                          6871PLUSNETUKInternetServiceProviderGBtrue
                          96.87.28.170
                          unknownUnited States
                          7922COMCAST-7922UStrue
                          75.109.111.89
                          unknownUnited States
                          19108SUDDENLINK-COMMUNICATIONSUStrue
                          124.122.47.148
                          unknownThailand
                          17552TRUE-AS-APTrueInternetCoLtdTHtrue
                          88.126.94.4
                          unknownFrance
                          12322PROXADFRtrue
                          85.57.212.13
                          unknownSpain
                          12479UNI2-ASEStrue
                          103.101.203.177
                          unknownSingapore
                          133136MYREPUBLIC-SGMyRepublicLtdSGtrue
                          94.204.202.106
                          unknownUnited Arab Emirates
                          15802DU-AS1AEtrue
                          47.205.25.170
                          unknownUnited States
                          5650FRONTIER-FRTRUStrue
                          95.45.50.93
                          unknownIreland
                          5466EIRCOMInternetHouseIEtrue
                          85.61.165.153
                          unknownSpain
                          12479UNI2-ASEStrue
                          80.12.88.148
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          103.144.201.48
                          unknownunknown
                          139762MSSOLUTION-AS-APSolutionBDtrue
                          102.156.10.183
                          unknownTunisia
                          37705TOPNETTNtrue
                          86.132.236.117
                          unknownUnited Kingdom
                          2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                          205.237.67.69
                          unknownCanada
                          11290CC-3272CAtrue
                          201.143.215.69
                          unknownMexico
                          8151UninetSAdeCVMXtrue
                          76.178.148.107
                          unknownUnited States
                          10838OCEANIC-INTERNET-RRUStrue
                          69.242.31.249
                          unknownUnited States
                          7922COMCAST-7922UStrue
                          85.104.105.67
                          unknownTurkey
                          9121TTNETTRtrue
                          41.186.88.38
                          unknownRwanda
                          36890MTNRW-ASNRWtrue
                          76.16.49.134
                          unknownUnited States
                          7922COMCAST-7922UStrue
                          90.104.151.37
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          201.244.108.183
                          unknownColombia
                          19429ETB-ColombiaCOtrue
                          103.42.86.42
                          unknownIndia
                          133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
                          105.184.209.194
                          unknownSouth Africa
                          37457Telkom-InternetZAtrue
                          116.74.163.130
                          unknownIndia
                          17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                          116.120.145.170
                          unknownKorea Republic of
                          9318SKB-ASSKBroadbandCoLtdKRtrue
                          103.139.242.6
                          unknownIndia
                          138798MUTINY-AS-INMutinySystemsPrivateLimitedINtrue
                          70.28.50.223
                          unknownCanada
                          577BACOMCAtrue
                          217.195.153.225
                          garokelka.comNetherlands
                          395092SHOCK-1USfalse
                          98.145.23.67
                          unknownUnited States
                          20001TWC-20001-PACWESTUStrue
                          81.229.117.95
                          unknownSweden
                          3301TELIANET-SWEDENTeliaCompanySEtrue
                          82.125.44.236
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          45.243.142.31
                          unknownEgypt
                          24863LINKdotNET-ASEGtrue
                          89.129.109.27
                          unknownSpain
                          12479UNI2-ASEStrue
                          27.109.19.90
                          unknownIndia
                          17625BLAZENET-IN-APBlazeNetsNetworkINtrue
                          122.186.210.254
                          unknownIndia
                          9498BBIL-APBHARTIAirtelLtdINtrue
                          122.184.143.86
                          unknownIndia
                          9498BBIL-APBHARTIAirtelLtdINtrue
                          50.68.186.195
                          unknownCanada
                          6327SHAWCAtrue
                          45.62.70.33
                          unknownCanada
                          40440NRTC-CAtrue
                          83.249.198.100
                          unknownSweden
                          39651COMHEM-SWEDENSEtrue
                          12.172.173.82
                          unknownUnited States
                          2386INS-ASUStrue
                          47.199.241.39
                          unknownUnited States
                          5650FRONTIER-FRTRUStrue
                          79.168.224.165
                          unknownPortugal
                          2860NOS_COMUNICACOESPTtrue
                          199.27.66.213
                          unknownUnited States
                          40608HCTNEBRASKAUStrue
                          176.142.207.63
                          unknownFrance
                          5410BOUYGTEL-ISPFRtrue
                          86.176.83.44
                          unknownUnited Kingdom
                          2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                          92.154.17.149
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          65.95.141.84
                          unknownCanada
                          577BACOMCAtrue
                          50.68.204.71
                          unknownCanada
                          6327SHAWCAtrue
                          89.79.229.50
                          unknownPoland
                          6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingtrue
                          71.38.155.217
                          unknownUnited States
                          209CENTURYLINK-US-LEGACY-QWESTUStrue
                          77.126.99.230
                          unknownIsrael
                          9116GOLDENLINES-ASNPartnerCommunicationsMainAutonomousSystetrue
                          103.123.223.133
                          unknownIndia
                          138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
                          31.53.29.235
                          unknownUnited Kingdom
                          2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                          198.2.51.242
                          unknownUnited States
                          20001TWC-20001-PACWESTUStrue
                          93.147.235.8
                          unknownItaly
                          30722VODAFONE-IT-ASNITtrue
                          92.9.45.20
                          unknownUnited Kingdom
                          13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
                          113.11.92.30
                          unknownBangladesh
                          7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
                          96.114.21.40
                          xfinity.comUnited States
                          7922COMCAST-7922USfalse
                          77.86.98.236
                          unknownUnited Kingdom
                          12390KINGSTON-UK-ASGBtrue
                          172.115.17.50
                          unknownUnited States
                          20001TWC-20001-PACWESTUStrue
                          Joe Sandbox Version:37.1.0 Beryl
                          Analysis ID:880006
                          Start date and time:2023-06-01 18:05:40 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 11m 46s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Run name:Without Instrumentation
                          Number of analysed new started processes analysed:9
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:ProjectFunding_450726_Jun01.js
                          Detection:MAL
                          Classification:mal92.troj.evad.winJS@10/19@3/100
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 100% (good quality ratio 60.8%)
                          • Quality average: 43.6%
                          • Quality standard deviation: 40.1%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .js
                          • Override analysis time to 240s for JS/VBS files not yet terminated
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded IPs from analysis (whitelisted): 104.77.34.176
                          • Excluded domains from analysis (whitelisted): e10994.dscx.akamaiedge.net, ctldl.windowsupdate.com, www.xfinity.com.edgekey.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • VT rate limit hit for: ProjectFunding_450726_Jun01.js
                          TimeTypeDescription
                          18:06:38API Interceptor1x Sleep call for process: msiexec.exe modified
                          18:06:48API Interceptor9x Sleep call for process: wermgr.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):9204
                          Entropy (8bit):5.57679529554553
                          Encrypted:false
                          SSDEEP:96:MMHEHYtJKeoCLS2UMeFHkWHFPw9CsvRqeHtUMeFHkWHFPw9C6jfq0U/vRqeHDHVd:MMkveuMeEWlwgYmMeEWlwg5xxPpUVpE
                          MD5:84FE0B5BC8ABDDB974E369707AD19242
                          SHA1:24377A41676C271D39E4E80253B630203811D0CB
                          SHA-256:E7893592E97850ABFD1B316329421FC65F02609F6C9ABB3E2E13C540ED58C03B
                          SHA-512:DB3BCF5F562F992F0D6B1671FAA8E04FD3F4DA2DA01A2DD6EF0E4558D9A444CDB31316086CB4BA0CFF76604069F6CB9944D02F4BFBE25F5830D3E26E4FC2DB05
                          Malicious:false
                          Preview:...@IXOS.@.....@..V.@.....@.....@.....@.....@.....@......&.{96CEB4EF-A52D-4EEF-96B9-6BAA63C42447}'.Adobe Acrobat PDF Browser Plugin 4.8.25..yjxcii.msi.@.....@.....@.....@........&.{04978FC0-C46D-416F-9983-8CD7C69572EE}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}&.{96CEB4EF-A52D-4EEF-96B9-6BAA63C42447}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..;.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\....C.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll....E.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs....WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....%.Software\AdobeAcrobatPDFBrowserPlugin...@....(.&...AdobeAcrobatPDF
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):770192
                          Entropy (8bit):6.877946115493149
                          Encrypted:false
                          SSDEEP:12288:ovXYcP7kXn89DhAw1vUN3RFEycMFSDXxqEbfRh+NjAyejvDYTrU0chn:mvTkXnyDPORDccmEsP+NjAyej7Ys0a
                          MD5:3C0944AE53F5E8A246872531F17AFE11
                          SHA1:F13C3A9A232E9E4932B57C08294E294B50EBF87D
                          SHA-256:D59E572AD380CD0CA263BEDDF431A60DAD4EB7224E7997C1A5847B924078267B
                          SHA-512:4E979F2DA55539B38977AA4950C1FA4D84DC8AF26E4FC790D5FCE52E9A5305A88A33F3A034EBF5984E324335C0FF36AFD385EF7A90F181163388818EF9BE1380
                          Malicious:false
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........5.Fz[XFz[XFz[XO..XBz[X]..XCz[XFzZX.x[X.4.XGz[X]..XEz[X]..XKz[X]..X!z[X]..XGz[X]..XGz[X]..XGz[XRichFz[X................PE..L.....6P...........!.........t.......................................................9....@......................... ....D...[..d....P.......................`..<...0...............................H<..@............................................text...E........................... ..`.rdata...p.......r..................@..@.data...D%... ..."..................@....rsrc........P....... ..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):132
                          Entropy (8bit):4.599233980549996
                          Encrypted:false
                          SSDEEP:3:LwBxFkvH4dGmMKLVKRLGPz4VAFkvH4dGmMKLVKRLGH:cHFkvYdlZKRLi7FkvYdlZKRL4
                          MD5:0D4C9F15CE74465C59AE36A27F98C817
                          SHA1:9CCE8EEFA4D3D9C5E161C5DBB860CFE1489C6B1A
                          SHA-256:D24E3399060B51F3A1C9D41A67DE2601888A35C99DA8DB70070D757BB3F1913A
                          SHA-512:9BED0EAFC2CF2A2360850CA1070FFB04AC14F04C78379485998A93F45012B5C11CC7F6F68129F65B8B5F90437CB965908C6A1BB9D83A56B068D6BDE1D5FDAD1F
                          Malicious:false
                          Preview:MsgBox "Adobe Acrobat PDF Browser Plugin installation error 0x00000328", 16, "Adobe Acrobat PDF Browser Plugin installation error"..
                          Process:C:\Windows\SysWOW64\wermgr.exe
                          File Type:HTML document, ASCII text, with very long lines (65212)
                          Category:dropped
                          Size (bytes):149673
                          Entropy (8bit):5.2876644855030595
                          Encrypted:false
                          SSDEEP:3072:/DbDv9PpwZW+V6ssCcVwjhrTFJnZV12K5AZvBYEKdBW:zIAuW
                          MD5:7EBE3B8C23361677A5D266FC33AD5CE0
                          SHA1:95575823454420072615E512F96E6AE5061ACA35
                          SHA-256:C7EDD3195D91EF7CD82A3041875BE1D314DFB5E5B58116D9FB8DAEAB3015E929
                          SHA-512:83F660B73447B91B5EC02D0126739B24C831B7BEBF50FEC72AADA185CCC7068E30B1666B7D52CEE81120B75F2ABC9868E2C0470E5D92632F12FDE8981457C5C4
                          Malicious:false
                          Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name="theme-color" content="#000000"><script>if (typeof window !== "undefined" && typeof window.process === "undefined") {. window.process = window.process || { env: {} };. }</script><script type="env-config">{"clientId":"xfinity-learn-ui","sitecoreApiKey":"{1A57AE5E-AF7C-4A9E-803A-C756E3F23267}","sitecoreApiUrl":"https://jss.xfinity.com/","dictionaryKey":"{5FA0A82E-BBDB-4FBD-A3F4-9C5D07AA6E0E}","uniform":false,"oAuth":{"clientId":"shoplearn-web","endpoint":"https://oauth.xfinity.com"},"endpoints":{"ssmEnv":"https://api.sc.xfinity.com","aiQApiUrl":"https://aiq-prod.codebig2.net","errorRedirectUrl":"https://www.xfinity.com/learn/landing/sorry","cspApiUrl":"https://csp-prod.codebig2.net","dataLayerTimelineApiUrl":"https://bdl43tfhab.execute-api.us-east-1.amazonaws.com/prod/aiq-banner"},"environment":{"name":"PROD"},"appName":"xfinity-lea
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {04978FC0-C46D-416F-9983-8CD7C69572EE}, Create Time/Date: Thu Jun 1 15:57:38 2023, Last Saved Time/Date: Thu Jun 1 15:57:38 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                          Category:dropped
                          Size (bytes):413696
                          Entropy (8bit):7.876840695992402
                          Encrypted:false
                          SSDEEP:6144:VrVPe+3R6gz8C1psDVw8EAYwzPJLNee9iZiYnCpqvY1dGujAyep5vD5aw4vSHR:axCriEQzPJLNee9Lp1NjAyefvDav6R
                          MD5:01B4260B2D32A2E757F3720719EEE290
                          SHA1:3E04D42777C59BFE821838C09E3EAFA758D37A1F
                          SHA-256:CCDE8420DBD52ABC7A45178EC7F6E41FC7C1DF9CF51388D77AF4D76877CABD75
                          SHA-512:957D4846EFDF80BA20E9DC95D7EA20ACCBF56F3200B0D0E431261C4075548587810C61FD69E96F21A6E06C74BA30E7D07EE17CDA0716DB0F9F91ED625F728270
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Acrobat PDF Browser Plugin 4.8.25, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Acrobat PDF Browser Plugin, Template: Intel;1033, Revision Number: {04978FC0-C46D-416F-9983-8CD7C69572EE}, Create Time/Date: Thu Jun 1 15:57:38 2023, Last Saved Time/Date: Thu Jun 1 15:57:38 2023, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                          Category:dropped
                          Size (bytes):413696
                          Entropy (8bit):7.876840695992402
                          Encrypted:false
                          SSDEEP:6144:VrVPe+3R6gz8C1psDVw8EAYwzPJLNee9iZiYnCpqvY1dGujAyep5vD5aw4vSHR:axCriEQzPJLNee9Lp1NjAyefvDav6R
                          MD5:01B4260B2D32A2E757F3720719EEE290
                          SHA1:3E04D42777C59BFE821838C09E3EAFA758D37A1F
                          SHA-256:CCDE8420DBD52ABC7A45178EC7F6E41FC7C1DF9CF51388D77AF4D76877CABD75
                          SHA-512:957D4846EFDF80BA20E9DC95D7EA20ACCBF56F3200B0D0E431261C4075548587810C61FD69E96F21A6E06C74BA30E7D07EE17CDA0716DB0F9F91ED625F728270
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):2187
                          Entropy (8bit):5.6363323530148035
                          Encrypted:false
                          SSDEEP:48:dMH72bRJwCP3qLDufME3YLEBoD8SY1eUFEHciHHzaEVlt/1wH7Hp:dMHMyfGYLKAue2MrHHzaEP8H7Hp
                          MD5:B598E15C88764342AAE04F576B2E7554
                          SHA1:493D93AB4E35D7ECCA5B372ABC9276601362E0AF
                          SHA-256:D5C366D9D541B96C41C10C79BEAF62B0690F741709DA2ABF352C6DDEEB178423
                          SHA-512:4D6544F1009886D15F24B8534E24EDA31CE19397BE11152DFE4DDB06D966268442147602C576B79B8C46F90147EDBE19468F45766AF28110B878A7CD188BB3F3
                          Malicious:false
                          Preview:...@IXOS.@.....@..V.@.....@.....@.....@.....@.....@......&.{96CEB4EF-A52D-4EEF-96B9-6BAA63C42447}'.Adobe Acrobat PDF Browser Plugin 4.8.25..yjxcii.msi.@.....@.....@.....@........&.{04978FC0-C46D-416F-9983-8CD7C69572EE}.....@.....@.....@.....@.......@.....@.....@.......@....'.Adobe Acrobat PDF Browser Plugin 4.8.25......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{82B5B2FD-2237-42AB-9F03-B3B9EAB30000}F.01:\Software\AdobeAcrobatPDFBrowserPlugin\AdobeAcrobatPDFBrowserPlugin.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@......;.C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\..).1\xssanpen\|AdobeAcrobatPDFBrowserPlugin\......Please insert the disk: ..media3.cab.@.....@.... .C:\Windows\Installer\MSI319E.tmp.........@........main.dll..dll_main..main.dll.@.....@.....@.......@.
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Cannot read section info
                          Category:dropped
                          Size (bytes):20480
                          Entropy (8bit):1.5153161959760162
                          Encrypted:false
                          SSDEEP:48:98PhpuRc06WXOCFT50Q+WIWGMS59z7uSiWoJGMSI818lJMOp:ghp1UFT9+2Q/WF9MOp
                          MD5:266A7251130E83E056D847C54D27008F
                          SHA1:8BD2ECEF2C1A9B0041B11E38AEAF2E1430D3B54D
                          SHA-256:E97AC3B1BFB593699A3CBDA187858EF21F5D808A13CDC086ED913470ADE5CC42
                          SHA-512:3CB622938D0B8CC543C4392C3FBD9801242228E1708694F97FAD3B8460409D889F54FE4DC88410D6D0D75612F5CE622E7F31AC8EF70C5382781039C137B80297
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):69632
                          Entropy (8bit):0.12496035548864996
                          Encrypted:false
                          SSDEEP:24:M7MOYOtzW7s818lOdWmmqrb9ipV4dWmmqrb9ipV7V3+bWG87sGgSi+ZcZk5z+Z5Q:eMOpJ818lEGMSoGMS59z7uSiWoQzW5Q
                          MD5:DC8C51D16E9966D19726F7ADC8AC5D65
                          SHA1:CC2D5BA3CE57EA1AF46F93EC8E2F8733E87EAD40
                          SHA-256:A466FD1A46AB4CED879E5873F9CC5C047019DEE22D96F9163634EB77B25B6E79
                          SHA-512:5451FC7BF6D2BFC2D96D9ACEF275777FAB91482AC81965F6B93EA59F1AA86AC340145D5FA2F56E8238715474E0B1DD91FD72DFB4776DCA07E5D3BC5DEF664DC6
                          Malicious:false
                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Cannot read section info
                          Category:dropped
                          Size (bytes):32768
                          Entropy (8bit):1.2175273904956243
                          Encrypted:false
                          SSDEEP:48:rsRuLAMFFXOTT5lQ+WIWGMS59z7uSiWoJGMSI818lJMOp:IRoOT0+2Q/WF9MOp
                          MD5:2447547B4D14FFCBA21C742B5C25754A
                          SHA1:050B5D5F9CCC9C2B1012FCAE76FF9C17CD73E86C
                          SHA-256:EF05DA126890FDB6C62846C7BD1B2A9767686A95270E29ACEFF26C1C9DB0811E
                          SHA-512:8A9CD27016CEE5D1B1234B5DC17335DD44C70C107ACC1BD07DFC90A55F2AA59353495806010D4A3F67C2E8D5FEEE07308137EA9447F0B1F86396D30024D84431
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):512
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3::
                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                          Malicious:false
                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Cannot read section info
                          Category:dropped
                          Size (bytes):32768
                          Entropy (8bit):1.2175273904956243
                          Encrypted:false
                          SSDEEP:48:rsRuLAMFFXOTT5lQ+WIWGMS59z7uSiWoJGMSI818lJMOp:IRoOT0+2Q/WF9MOp
                          MD5:2447547B4D14FFCBA21C742B5C25754A
                          SHA1:050B5D5F9CCC9C2B1012FCAE76FF9C17CD73E86C
                          SHA-256:EF05DA126890FDB6C62846C7BD1B2A9767686A95270E29ACEFF26C1C9DB0811E
                          SHA-512:8A9CD27016CEE5D1B1234B5DC17335DD44C70C107ACC1BD07DFC90A55F2AA59353495806010D4A3F67C2E8D5FEEE07308137EA9447F0B1F86396D30024D84431
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):512
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3::
                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                          Malicious:false
                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):512
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3::
                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                          Malicious:false
                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Cannot read section info
                          Category:dropped
                          Size (bytes):32768
                          Entropy (8bit):1.2175273904956243
                          Encrypted:false
                          SSDEEP:48:rsRuLAMFFXOTT5lQ+WIWGMS59z7uSiWoJGMSI818lJMOp:IRoOT0+2Q/WF9MOp
                          MD5:2447547B4D14FFCBA21C742B5C25754A
                          SHA1:050B5D5F9CCC9C2B1012FCAE76FF9C17CD73E86C
                          SHA-256:EF05DA126890FDB6C62846C7BD1B2A9767686A95270E29ACEFF26C1C9DB0811E
                          SHA-512:8A9CD27016CEE5D1B1234B5DC17335DD44C70C107ACC1BD07DFC90A55F2AA59353495806010D4A3F67C2E8D5FEEE07308137EA9447F0B1F86396D30024D84431
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Cannot read section info
                          Category:dropped
                          Size (bytes):20480
                          Entropy (8bit):1.5153161959760162
                          Encrypted:false
                          SSDEEP:48:98PhpuRc06WXOCFT50Q+WIWGMS59z7uSiWoJGMSI818lJMOp:ghp1UFT9+2Q/WF9MOp
                          MD5:266A7251130E83E056D847C54D27008F
                          SHA1:8BD2ECEF2C1A9B0041B11E38AEAF2E1430D3B54D
                          SHA-256:E97AC3B1BFB593699A3CBDA187858EF21F5D808A13CDC086ED913470ADE5CC42
                          SHA-512:3CB622938D0B8CC543C4392C3FBD9801242228E1708694F97FAD3B8460409D889F54FE4DC88410D6D0D75612F5CE622E7F31AC8EF70C5382781039C137B80297
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:Composite Document File V2 Document, Cannot read section info
                          Category:dropped
                          Size (bytes):20480
                          Entropy (8bit):1.5153161959760162
                          Encrypted:false
                          SSDEEP:48:98PhpuRc06WXOCFT50Q+WIWGMS59z7uSiWoJGMSI818lJMOp:ghp1UFT9+2Q/WF9MOp
                          MD5:266A7251130E83E056D847C54D27008F
                          SHA1:8BD2ECEF2C1A9B0041B11E38AEAF2E1430D3B54D
                          SHA-256:E97AC3B1BFB593699A3CBDA187858EF21F5D808A13CDC086ED913470ADE5CC42
                          SHA-512:3CB622938D0B8CC543C4392C3FBD9801242228E1708694F97FAD3B8460409D889F54FE4DC88410D6D0D75612F5CE622E7F31AC8EF70C5382781039C137B80297
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):512
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3::
                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                          Malicious:false
                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\msiexec.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):512
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3::
                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                          Malicious:false
                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:ASCII text, with very long lines (1337), with CRLF line terminators
                          Entropy (8bit):5.540540865355687
                          TrID:
                            File name:ProjectFunding_450726_Jun01.js
                            File size:1400
                            MD5:a657553449746c482dacfe3b19119b7a
                            SHA1:630b815d443f8f7ef7e4c4c7c100de1cd8a7ed53
                            SHA256:44e029dd6210c4906a82e1f16dd5ebed434efd225dafb92fc560e6ff6d1ee948
                            SHA512:dea33536a5c5fe279ca1a8a3d4639be0f49d5ca3c21f4cbbda10c5d059837c2bc4c3917cdbddd0fc9f4a0773f325369b200f0df8e0035da6afab26f09502c321
                            SSDEEP:24:5PyzicY1VBFAMhY1VBcrFKW/KOXNY5vevO7VoYDT2ADpBiW+bDwi8H9i3VIwmq2O:54MZr5FYNOlyDpB2bDwVH9KVMq2YGfBK
                            TLSH:EB21BE1708699DBC25F78BC52F0C5C81F0FFC2B2DAD4C4335851C88A4089A9AEE2587D
                            File Content Preview:// quapqospufftqhkzhpufbasppgs..var _$_cdc5=(function(_0x1CEE1,_0x1CE96){var _0x1D184=_0x1CEE1.length;var _0x1D00D=[];for(var _0x1CE4B=0;_0x1CE4B< _0x1D184;_0x1CE4B++){_0x1D00D[_0x1CE4B]= _0x1CEE1.charAt(_0x1CE4B)};for(var _0x1CE4B=0;_0x1CE4B< _0x1D184;_0
                            Icon Hash:68d69b8bb6aa9a86
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 1, 2023 18:06:37.556247950 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.556328058 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:37.556574106 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.562053919 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.562086105 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:37.677259922 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:37.677373886 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.681977987 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.681996107 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:37.684689999 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:37.726300001 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.857539892 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:37.900295019 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046196938 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046225071 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046243906 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046263933 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046293974 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046325922 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.046353102 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046375036 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046391964 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.046391964 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.046411037 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.046413898 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.046477079 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.046477079 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.076159000 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.076198101 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.076364994 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.076392889 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.076478958 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.076684952 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.076714039 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.076843977 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.076860905 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.077159882 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.077605009 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.077632904 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.077871084 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.077886105 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.078963041 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.105827093 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.105868101 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.106095076 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.106143951 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.106179953 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.106287003 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.106287003 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.106463909 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.106511116 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.106596947 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.106614113 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.121243954 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.121306896 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.121459007 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.121603012 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.121603012 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.121633053 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.121756077 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.136962891 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137041092 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137295961 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137310982 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.137310982 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.137351036 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137387991 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137473106 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.137473106 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.137497902 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137666941 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137725115 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.137831926 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.137831926 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.137868881 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138067007 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138104916 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138245106 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138360023 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.138360023 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.138367891 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138392925 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138427019 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138489962 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138504028 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.138504028 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.138535976 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.138632059 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.138632059 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.140193939 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.151086092 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151137114 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151225090 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151612997 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151660919 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151747942 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.151747942 CEST49719443192.168.2.5217.195.153.225
                            Jun 1, 2023 18:06:38.151801109 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151954889 CEST44349719217.195.153.225192.168.2.5
                            Jun 1, 2023 18:06:38.151982069 CEST44349719217.195.153.225192.168.2.5
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 1, 2023 18:06:37.511677980 CEST5148453192.168.2.58.8.8.8
                            Jun 1, 2023 18:06:37.540517092 CEST53514848.8.8.8192.168.2.5
                            Jun 1, 2023 18:09:39.249587059 CEST5675153192.168.2.58.8.8.8
                            Jun 1, 2023 18:09:39.278398991 CEST53567518.8.8.8192.168.2.5
                            Jun 1, 2023 18:09:40.863815069 CEST5503953192.168.2.58.8.8.8
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jun 1, 2023 18:06:37.511677980 CEST192.168.2.58.8.8.80x9100Standard query (0)garokelka.comA (IP address)IN (0x0001)false
                            Jun 1, 2023 18:09:39.249587059 CEST192.168.2.58.8.8.80xc398Standard query (0)xfinity.comA (IP address)IN (0x0001)false
                            Jun 1, 2023 18:09:40.863815069 CEST192.168.2.58.8.8.80x12ccStandard query (0)www.xfinity.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jun 1, 2023 18:06:37.540517092 CEST8.8.8.8192.168.2.50x9100No error (0)garokelka.com217.195.153.225A (IP address)IN (0x0001)false
                            Jun 1, 2023 18:09:39.278398991 CEST8.8.8.8192.168.2.50xc398No error (0)xfinity.com96.114.21.40A (IP address)IN (0x0001)false
                            Jun 1, 2023 18:09:39.278398991 CEST8.8.8.8192.168.2.50xc398No error (0)xfinity.com96.114.14.140A (IP address)IN (0x0001)false
                            Jun 1, 2023 18:09:39.278398991 CEST8.8.8.8192.168.2.50xc398No error (0)xfinity.com68.87.41.40A (IP address)IN (0x0001)false
                            Jun 1, 2023 18:09:40.892581940 CEST8.8.8.8192.168.2.50x12ccNo error (0)www.xfinity.comwww.xfinity.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
                            • garokelka.com
                            • xfinity.com

                            Click to jump to process

                            Target ID:0
                            Start time:18:06:36
                            Start date:01/06/2023
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ProjectFunding_450726_Jun01.js"
                            Imagebase:0x7ff7457b0000
                            File size:163840 bytes
                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:1
                            Start time:18:06:37
                            Start date:01/06/2023
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\msiexec.exe /V
                            Imagebase:0x7ff714530000
                            File size:66048 bytes
                            MD5 hash:4767B71A318E201188A0D0A420C8B608
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:18:06:39
                            Start date:01/06/2023
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
                            Imagebase:0x7ff73f7a0000
                            File size:69632 bytes
                            MD5 hash:73C519F050C20580F8A62C849D49215A
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:3
                            Start time:18:06:39
                            Start date:01/06/2023
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:wscript.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
                            Imagebase:0x7ff7457b0000
                            File size:163840 bytes
                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:4
                            Start time:18:06:39
                            Start date:01/06/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
                            Imagebase:0x10b0000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000002.400127832.0000000004C30000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000002.400000830.0000000000ECA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:5
                            Start time:18:06:43
                            Start date:01/06/2023
                            Path:C:\Windows\SysWOW64\wermgr.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\wermgr.exe
                            Imagebase:0xda0000
                            File size:191904 bytes
                            MD5 hash:CCF15E662ED5CE77B5FF1A7AAE305233
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            No disassembly