Windows Analysis Report
qbot1.dll

Overview

General Information

Sample Name: qbot1.dll
Analysis ID: 880144
MD5: 682b7633158d20f720ca61cc96c45c50
SHA1: 1f409c817fdf4d65c1f2009f925b583672f67619
SHA256: 83380409b59ca7c171c09f2972034ec5d1789b6e5830e333a897dc4ac1ec885e
Infos:

Detection

Qbot
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Yara detected Qbot
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Queries memory information (via WMI often done to detect virtual machines)
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
C2 URLs / IPs found in malware configuration
Uses whoami command line tool to query computer and username
Uses ipconfig to lookup or modify the Windows network settings
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Creates files inside the system directory
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

Name Description Attribution Blogpost URLs Link
QakBot, qbotQbot QBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot

AV Detection

barindex
Source: 00000013.00000002.424621480.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685604052", "Version": "404.1346", "C2 list": ["47.199.241.39:443", "93.147.235.8:443", "75.141.227.169:443", "45.243.142.31:995", "79.92.15.6:443", "85.104.105.67:443", "89.129.109.27:2222", "86.176.83.44:2222", "24.234.220.88:993", "89.32.156.5:995", "12.172.173.82:22", "103.101.203.177:443", "70.28.50.223:2083", "98.187.21.2:443", "70.49.205.198:2222", "96.56.197.26:2222", "92.9.45.20:2222", "86.195.14.72:2222", "172.115.17.50:443", "100.4.163.158:2222", "80.12.88.148:2222", "213.64.33.92:2222", "113.11.92.30:443", "78.192.109.105:2222", "47.34.30.133:443", "122.184.143.86:443", "198.2.51.242:993", "165.120.169.171:2222", "88.126.94.4:50000", "82.125.44.236:2222", "117.195.16.105:993", "147.219.4.194:443", "80.167.196.79:443", "92.154.17.149:2222", "184.181.75.148:443", "95.45.50.93:2222", "84.35.26.14:995", "201.143.215.69:443", "12.172.173.82:2087", "50.68.204.71:443", "64.121.161.102:443", "2.82.8.80:443", "79.77.142.22:2222", "12.172.173.82:995", "223.166.13.95:995", "72.134.124.16:443", "213.55.33.103:443", "183.87.163.165:443", "174.4.89.3:443", "27.253.11.10:2222", "2.49.63.160:2222", "92.186.69.229:2222", "69.133.162.35:443", "81.111.108.123:443", "12.172.173.82:20", "188.28.19.84:443", "90.29.86.138:2222", "70.160.67.203:443", "186.64.67.30:443", "5.107.153.132:2222", "125.63.125.205:2078", "2.36.64.159:2078", "71.38.155.217:443", "205.237.67.69:995", "70.64.77.115:443", "24.234.220.88:990", "96.56.197.26:2083", "70.28.50.223:2078", "103.123.223.133:443", "199.27.66.213:443", "83.249.198.100:2222", "94.204.202.106:443", "77.126.99.230:443", "72.205.104.134:443", "65.95.141.84:2222", "70.28.50.223:2078", "173.88.135.179:443", "220.240.164.182:443", "96.87.28.170:2222", "176.142.207.63:443", "12.172.173.82:32101", "70.50.83.216:2222", "161.142.103.187:995", "45.62.70.33:443", "24.234.220.88:465", "103.141.50.43:995", "90.7.72.46:2222", "76.178.148.107:2222", "116.74.163.130:443", "46.246.254.242:995", "70.28.50.223:2087", "12.172.173.82:465", "178.175.187.254:443", "27.0.48.233:443", "83.110.223.61:443", "184.182.66.109:443", "70.28.50.223:32100", "50.68.204.71:993", "70.28.50.223:3389", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "76.170.252.153:995", "69.242.31.249:443", "79.168.224.165:2222", "75.143.236.149:443", "14.192.241.76:995", "81.229.117.95:2222", "98.145.23.67:443", "98.37.25.99:443", "69.160.121.6:61201", "12.172.173.82:21", "75.109.111.89:443", "76.86.31.59:443", "80.6.50.34:443", "116.120.145.170:995", "201.244.108.183:995", "58.186.75.42:443", "68.203.69.96:443", "47.149.134.231:443"]}
Source: qbot1.dll Virustotal: Detection: 12% Perma Link
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: error res='%s' err=%d len=%u
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: netstat -nao
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: runas
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ipconfig /all
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: net localgroup
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: nltest /domain_trusts /all_trusts
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Microsoft
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELF_TEST_1
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: p%08x
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Self test FAILED!!!
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Self test OK.
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: /t5
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: whoami /all
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: cmd
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: route print
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .lnk
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: arp -a
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %s "$%s = \"%s\"; & $%s"
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: net share
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: cmd.exe /c set
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Self check
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %u;%u;%u;
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ProfileImagePath
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: at.exe %u:%u "%s" /I
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ProgramData
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Self check ok!
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: powershell.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: qwinsta
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: net view
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Component_08
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Start screenshot
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: schtasks.exe /Delete /F /TN %u
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: appidapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: c:\ProgramData
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Component_07
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: powershell.exe -encodedCommand %S
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ERROR: GetModuleFileNameW() failed with error: %u
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: powershell.exe -encodedCommand
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: error res='%s' err=%d len=%u
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: netstat -nao
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: runas
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ipconfig /all
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %u.%u.%u.%u.%u.%u.%04x
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SystemRoot
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: cscript.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: MBAMService.exe;mbamgui.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\xwizard.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\wermgr.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: C:\INTERNAL\__empty
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_PhysicalMemory
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ALLUSERSPROFILE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: image/jpeg
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: LocalLow
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: displayName
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: shlwapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\WerFault.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CommandLine
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: kernel32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SubmitSamplesConsent
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: 1234567890
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wbj.go
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\wextract.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_DiskDrive
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: vkise.exe;isesrv.exe;cmdagent.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: System32
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Name
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\WerFault.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: WRSA.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: c:\\
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SpyNetReporting
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: FALSE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aswhookx.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Packages
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SonicWallClientProtectionService.exe;SWDash.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: application/x-shockwave-flash
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: RepUx.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\mspaint.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Winsta0
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\wermgr.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: avp.exe;kavtray.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: root\SecurityCenter2
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: MsMpEng.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: userenv.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: csc_ui.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: \\.\pipe\
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: pstorec.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: NTUSER.DAT
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: from
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\sethc.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: netapi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\Utilman.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: gdi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: setupapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELECT * FROM Win32_Processor
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: iphlpapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CrAmTray.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_ComputerSystem
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: user32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: xagtnotif.exe;AppUIMonitor.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\dxdiag.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: \sf2.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\grpconv.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: egui.exe;ekrn.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Software\Microsoft
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %S.%06d
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: bcrypt.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELECT * FROM AntiVirusProduct
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\SndVol.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\Utilman.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wtsapi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\xwizard.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: shell32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: TRUE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_Bios
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELECT * FROM Win32_OperatingSystem
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\mobsync.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: c:\hiberfil.sysss
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: */*
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: abcdefghijklmnopqrstuvwxyz
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ByteFence.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: type=0x%04X
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: snxhk_border_mywnd
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ROOT\CIMV2
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: https
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: fshoster32.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: kernelbase.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: regsvr32.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %s\system32\
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Content-Type: application/x-www-form-urlencoded
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_Process
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: rundll32.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: LOCALAPPDATA
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: cmd.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: APPDATA
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: select
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: mcshield.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: advapi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ws2_32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .cfg
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_Product
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: WQL
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wininet.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: LastBootUpTime
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: S:(ML;;NW;;;LW)
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: urlmon.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Create
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_PnPEntity
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\grpconv.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Initializing database...
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\SearchIndexer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: winsta0\default
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .dat
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: WBJ_IGNORE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: next
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\AtBroker.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wpcap.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\sethc.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: image/pjpeg
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: fmon.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\SndVol.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: vbs
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aswhooka.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SysWOW64
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\mspaint.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: mpr.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: image/gif
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: crypt32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ntdll.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: open
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CSFalconService.exe;CSFalconContainer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\wextract.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\mobsync.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %u.%u.%u.%u.%u.%u.%04x
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SystemRoot
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: cscript.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: MBAMService.exe;mbamgui.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\xwizard.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\wermgr.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: C:\INTERNAL\__empty
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_PhysicalMemory
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ALLUSERSPROFILE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: image/jpeg
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: LocalLow
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: displayName
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: shlwapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\WerFault.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CommandLine
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: kernel32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SubmitSamplesConsent
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: 1234567890
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wbj.go
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\wextract.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_DiskDrive
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: vkise.exe;isesrv.exe;cmdagent.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: System32
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Name
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\WerFault.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: WRSA.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: c:\\
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SpyNetReporting
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: FALSE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aswhookx.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Packages
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SonicWallClientProtectionService.exe;SWDash.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: application/x-shockwave-flash
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: RepUx.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\mspaint.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Winsta0
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\wermgr.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: avp.exe;kavtray.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: root\SecurityCenter2
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: MsMpEng.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: userenv.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: csc_ui.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: \\.\pipe\
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: pstorec.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: NTUSER.DAT
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: from
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\sethc.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: netapi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\Utilman.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: gdi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: setupapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELECT * FROM Win32_Processor
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: iphlpapi.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CrAmTray.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_ComputerSystem
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: user32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: xagtnotif.exe;AppUIMonitor.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\dxdiag.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: \sf2.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\grpconv.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: egui.exe;ekrn.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Software\Microsoft
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %S.%06d
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: bcrypt.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELECT * FROM AntiVirusProduct
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\SndVol.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\Utilman.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wtsapi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\xwizard.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: shell32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: TRUE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_Bios
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SELECT * FROM Win32_OperatingSystem
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\mobsync.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: c:\hiberfil.sysss
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: */*
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: abcdefghijklmnopqrstuvwxyz
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ByteFence.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: type=0x%04X
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: snxhk_border_mywnd
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ROOT\CIMV2
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: https
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: fshoster32.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: kernelbase.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: regsvr32.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %s\system32\
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Content-Type: application/x-www-form-urlencoded
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_Process
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: rundll32.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: LOCALAPPDATA
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: cmd.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: APPDATA
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: select
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: mcshield.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: advapi32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ws2_32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .cfg
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_Product
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: WQL
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wininet.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: LastBootUpTime
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: S:(ML;;NW;;;LW)
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: urlmon.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Create
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Win32_PnPEntity
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\grpconv.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Initializing database...
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\SearchIndexer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: winsta0\default
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: .dat
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: WBJ_IGNORE
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: next
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\AtBroker.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: wpcap.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\sethc.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: image/pjpeg
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: fmon.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\SndVol.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: vbs
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: aswhooka.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: SysWOW64
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\mspaint.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: mpr.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: image/gif
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: crypt32.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: ntdll.dll
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: open
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\explorer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: CSFalconService.exe;CSFalconContainer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\wextract.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\System32\mobsync.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack String decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
Source: qbot1.dll Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: unknown HTTPS traffic detected: 54.161.105.65:443 -> 192.168.2.5:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.100.215:443 -> 192.168.2.5:49737 version: TLS 1.2
Source: qbot1.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000003.00000002.398530807.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.398962293.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.403691320.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.409151582.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.417454259.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.417658145.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.418188854.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.429703826.000000001006A000.00000002.00000001.01000000.00000003.sdmp, qbot1.dll
Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000003.00000002.398530807.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.398962293.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.403691320.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.409151582.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.417454259.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.417658145.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.418188854.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.429703826.000000001006A000.00000002.00000001.01000000.00000003.sdmp, qbot1.dll
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A9E70 FindFirstFileW,FindNextFileW, 19_2_029A9E70

Networking

barindex
Source: Malware configuration extractor IPs: 47.199.241.39:443
Source: Malware configuration extractor IPs: 93.147.235.8:443
Source: Malware configuration extractor IPs: 75.141.227.169:443
Source: Malware configuration extractor IPs: 45.243.142.31:995
Source: Malware configuration extractor IPs: 79.92.15.6:443
Source: Malware configuration extractor IPs: 85.104.105.67:443
Source: Malware configuration extractor IPs: 89.129.109.27:2222
Source: Malware configuration extractor IPs: 86.176.83.44:2222
Source: Malware configuration extractor IPs: 24.234.220.88:993
Source: Malware configuration extractor IPs: 89.32.156.5:995
Source: Malware configuration extractor IPs: 12.172.173.82:22
Source: Malware configuration extractor IPs: 103.101.203.177:443
Source: Malware configuration extractor IPs: 70.28.50.223:2083
Source: Malware configuration extractor IPs: 98.187.21.2:443
Source: Malware configuration extractor IPs: 70.49.205.198:2222
Source: Malware configuration extractor IPs: 96.56.197.26:2222
Source: Malware configuration extractor IPs: 92.9.45.20:2222
Source: Malware configuration extractor IPs: 86.195.14.72:2222
Source: Malware configuration extractor IPs: 172.115.17.50:443
Source: Malware configuration extractor IPs: 100.4.163.158:2222
Source: Malware configuration extractor IPs: 80.12.88.148:2222
Source: Malware configuration extractor IPs: 213.64.33.92:2222
Source: Malware configuration extractor IPs: 113.11.92.30:443
Source: Malware configuration extractor IPs: 78.192.109.105:2222
Source: Malware configuration extractor IPs: 47.34.30.133:443
Source: Malware configuration extractor IPs: 122.184.143.86:443
Source: Malware configuration extractor IPs: 198.2.51.242:993
Source: Malware configuration extractor IPs: 165.120.169.171:2222
Source: Malware configuration extractor IPs: 88.126.94.4:50000
Source: Malware configuration extractor IPs: 82.125.44.236:2222
Source: Malware configuration extractor IPs: 117.195.16.105:993
Source: Malware configuration extractor IPs: 147.219.4.194:443
Source: Malware configuration extractor IPs: 80.167.196.79:443
Source: Malware configuration extractor IPs: 92.154.17.149:2222
Source: Malware configuration extractor IPs: 184.181.75.148:443
Source: Malware configuration extractor IPs: 95.45.50.93:2222
Source: Malware configuration extractor IPs: 84.35.26.14:995
Source: Malware configuration extractor IPs: 201.143.215.69:443
Source: Malware configuration extractor IPs: 12.172.173.82:2087
Source: Malware configuration extractor IPs: 50.68.204.71:443
Source: Malware configuration extractor IPs: 64.121.161.102:443
Source: Malware configuration extractor IPs: 2.82.8.80:443
Source: Malware configuration extractor IPs: 79.77.142.22:2222
Source: Malware configuration extractor IPs: 12.172.173.82:995
Source: Malware configuration extractor IPs: 223.166.13.95:995
Source: Malware configuration extractor IPs: 72.134.124.16:443
Source: Malware configuration extractor IPs: 213.55.33.103:443
Source: Malware configuration extractor IPs: 183.87.163.165:443
Source: Malware configuration extractor IPs: 174.4.89.3:443
Source: Malware configuration extractor IPs: 27.253.11.10:2222
Source: Malware configuration extractor IPs: 2.49.63.160:2222
Source: Malware configuration extractor IPs: 92.186.69.229:2222
Source: Malware configuration extractor IPs: 69.133.162.35:443
Source: Malware configuration extractor IPs: 81.111.108.123:443
Source: Malware configuration extractor IPs: 12.172.173.82:20
Source: Malware configuration extractor IPs: 188.28.19.84:443
Source: Malware configuration extractor IPs: 90.29.86.138:2222
Source: Malware configuration extractor IPs: 70.160.67.203:443
Source: Malware configuration extractor IPs: 186.64.67.30:443
Source: Malware configuration extractor IPs: 5.107.153.132:2222
Source: Malware configuration extractor IPs: 125.63.125.205:2078
Source: Malware configuration extractor IPs: 2.36.64.159:2078
Source: Malware configuration extractor IPs: 71.38.155.217:443
Source: Malware configuration extractor IPs: 205.237.67.69:995
Source: Malware configuration extractor IPs: 70.64.77.115:443
Source: Malware configuration extractor IPs: 24.234.220.88:990
Source: Malware configuration extractor IPs: 96.56.197.26:2083
Source: Malware configuration extractor IPs: 70.28.50.223:2078
Source: Malware configuration extractor IPs: 103.123.223.133:443
Source: Malware configuration extractor IPs: 199.27.66.213:443
Source: Malware configuration extractor IPs: 83.249.198.100:2222
Source: Malware configuration extractor IPs: 94.204.202.106:443
Source: Malware configuration extractor IPs: 77.126.99.230:443
Source: Malware configuration extractor IPs: 72.205.104.134:443
Source: Malware configuration extractor IPs: 65.95.141.84:2222
Source: Malware configuration extractor IPs: 70.28.50.223:2078
Source: Malware configuration extractor IPs: 173.88.135.179:443
Source: Malware configuration extractor IPs: 220.240.164.182:443
Source: Malware configuration extractor IPs: 96.87.28.170:2222
Source: Malware configuration extractor IPs: 176.142.207.63:443
Source: Malware configuration extractor IPs: 12.172.173.82:32101
Source: Malware configuration extractor IPs: 70.50.83.216:2222
Source: Malware configuration extractor IPs: 161.142.103.187:995
Source: Malware configuration extractor IPs: 45.62.70.33:443
Source: Malware configuration extractor IPs: 24.234.220.88:465
Source: Malware configuration extractor IPs: 103.141.50.43:995
Source: Malware configuration extractor IPs: 90.7.72.46:2222
Source: Malware configuration extractor IPs: 76.178.148.107:2222
Source: Malware configuration extractor IPs: 116.74.163.130:443
Source: Malware configuration extractor IPs: 46.246.254.242:995
Source: Malware configuration extractor IPs: 70.28.50.223:2087
Source: Malware configuration extractor IPs: 12.172.173.82:465
Source: Malware configuration extractor IPs: 178.175.187.254:443
Source: Malware configuration extractor IPs: 27.0.48.233:443
Source: Malware configuration extractor IPs: 83.110.223.61:443
Source: Malware configuration extractor IPs: 184.182.66.109:443
Source: Malware configuration extractor IPs: 70.28.50.223:32100
Source: Malware configuration extractor IPs: 50.68.204.71:993
Source: Malware configuration extractor IPs: 70.28.50.223:3389
Source: Malware configuration extractor IPs: 50.68.186.195:443
Source: Malware configuration extractor IPs: 47.205.25.170:443
Source: Malware configuration extractor IPs: 12.172.173.82:993
Source: Malware configuration extractor IPs: 76.170.252.153:995
Source: Malware configuration extractor IPs: 69.242.31.249:443
Source: Malware configuration extractor IPs: 79.168.224.165:2222
Source: Malware configuration extractor IPs: 75.143.236.149:443
Source: Malware configuration extractor IPs: 14.192.241.76:995
Source: Malware configuration extractor IPs: 81.229.117.95:2222
Source: Malware configuration extractor IPs: 98.145.23.67:443
Source: Malware configuration extractor IPs: 98.37.25.99:443
Source: Malware configuration extractor IPs: 69.160.121.6:61201
Source: Malware configuration extractor IPs: 12.172.173.82:21
Source: Malware configuration extractor IPs: 75.109.111.89:443
Source: Malware configuration extractor IPs: 76.86.31.59:443
Source: Malware configuration extractor IPs: 80.6.50.34:443
Source: Malware configuration extractor IPs: 116.120.145.170:995
Source: Malware configuration extractor IPs: 201.244.108.183:995
Source: Malware configuration extractor IPs: 58.186.75.42:443
Source: Malware configuration extractor IPs: 68.203.69.96:443
Source: Malware configuration extractor IPs: 47.149.134.231:443
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: yahoo.comCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheConnection: Keep-AliveHost: www.yahoo.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: www.yahoo.comConnection: Keep-Alive
Source: global traffic TCP traffic: 192.168.2.5:49730 -> 213.64.33.92:2222
Source: unknown Network traffic detected: IP country count 29
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: unknown TCP traffic detected without corresponding DNS query: 213.64.33.92
Source: J7NKSXWB.htm.30.dr String found in binary or memory: C = {"useYAC":0,"usePE":0,"servicePath":"https:\/\/www.yahoo.com\/pdarla\/php\/fc.php","xservicePath":"","beaconPath":"https:\/\/www.yahoo.com\/pdarla\/php\/b.php","renderPath":"","allowFiF":false,"srenderPath":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1\/html\/r-sf.html","renderFile":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1\/html\/r-sf.html","sfbrenderPath":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1\/html\/r-sf.html","msgPath":"https:\/\/fc.yahoo.com\/unsupported-1946.html","cscPath":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1\/html\/r-csc.html","root":"pdarla","edgeRoot":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1","sedgeRoot":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1","version":"4-11-1","tpbURI":"","hostFile":"https:\/\/s.yimg.com\/rq\/darla\/4-11-1\/js\/g-r-min.js","beaconsDisabled":true,"rotationTimingDisabled":true,"fdb_locale":"What don't you like about this ad?|It's offensive|Something else|Thank you for helping us improve your Yahoo experience|It's not relevant|It's distracting|I don't like this ad|Send|Done|Why do I see ads?|Learn more about your feedback.|Want an ad-free inbox? Upgrade to Yahoo Mail Pro!|Upgrade Now","positions":{"DEFAULT":{"supports":false},"LDRB":{"w":728,"h":90},"LREC":{"w":300,"h":250},"MAST":{"w":1,"h":1},"MON":{"w":1,"h":1}},"lang":"en-US"}, equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: C.events = {"AUTO":{"autoDDG":1,"autoIV":1,"autoMax":25,"autoRT":10000,"autoStart":1,"name":"AUTO","ps":{"LREC":{"autoIV":1,"autoMax":25,"autoRT":"10000"},"LREC3":{"autoIV":1,"autoMax":25,"autoRT":"10000"},"LREC4":{"autoIV":1,"autoMax":25,"autoRT":"10000"},"MON":{"autoIV":1,"autoMax":25,"autoRT":"10000"},"MON2":{"autoIV":1,"autoMax":25,"autoRT":"10000"}},"groups":{"LREC3":"MON2","LREC4":"MON2","MON2":"LREC3,LREC4"},"sp":2023538075,"sa":"Y-BUCKET=\"900\" ctout=380 rs=\"lu:0;pt:home;site:fp;ver:megastrm\" refresh=true","ref":"https:\/\/www.yahoo.com\/","ult":{"pg":{"property":"fp_en-US","rid":"3ffu699i7hs9u","test":"900"}}},"adFetch":{"ps":"LDRB,LREC,MAST,MON","sp":2023538075,"sa":"Y-BUCKET=\"900\" ctout=380 rs=\"lu:0;pt:home;site:fp;ver:megastrm\"","ref":"https:\/\/www.yahoo.com\/","ult":{"pg":{"property":"fp_en-US","rid":"3ffu699i7hs9u","test":"900"}}}}; equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: C.positions = {"LDRB":{"clean":"sda-LDRB","dest":"sda-LDRB-iframe","fdb":1,"h":90,"id":"LDRB","metaSize":true,"pos":"LDRB","supports":{"exp-ovr":1,"exp-push":1,"lyr":0},"w":728,"meta":{"hostURL":"https:\/\/www.yahoo.com\/"}},"LREC":{"clean":"sda-LREC","dest":"sda-LREC-iframe","fdb":1,"h":250,"id":"LREC","metaSize":true,"pos":"LREC","supports":{"exp-ovr":0,"exp-push":0,"lyr":0},"w":300,"meta":{"hostURL":"https:\/\/www.yahoo.com\/"},"doubleBuffering":false},"MAST":{"clean":"sda-MAST","closeBtn":{"adc":0,"mode":2,"useShow":1},"dest":"sda-MAST-iframe","fdb":1,"h":250,"id":"MAST","metaSize":true,"pos":"MAST","supports":{"exp-ovr":0,"exp-push":1,"resize-to":1},"w":970,"meta":{"hostURL":"https:\/\/www.yahoo.com\/"}},"MON":{"clean":"sda-MON","dest":"sda-MON-iframe","fdb":1,"h":600,"id":"MON","metaSize":true,"pos":"MON","supports":{"exp-ovr":1,"exp-push":1,"lyr":0,"resize-to":1},"w":300,"meta":{"hostURL":"https:\/\/www.yahoo.com\/"}},"DEFAULT":{"sandbox":false}}; equals www.yahoo.com (Yahoo)
Source: de-ch[1].htm.30.dr String found in binary or memory: "sameAs":["https://www.facebook.com/microsoftschweiz","https://twitter.com/microsoft_ch","https://www.linkedin.com/company/1035","https://www.youtube.com/user/MicrosoftCH","https://www.instagram.com/microsoftch/"] equals www.facebook.com (Facebook)
Source: de-ch[1].htm.30.dr String found in binary or memory: "sameAs":["https://www.facebook.com/microsoftschweiz","https://twitter.com/microsoft_ch","https://www.linkedin.com/company/1035","https://www.youtube.com/user/MicrosoftCH","https://www.instagram.com/microsoftch/"] equals www.linkedin.com (Linkedin)
Source: de-ch[1].htm.30.dr String found in binary or memory: "sameAs":["https://www.facebook.com/microsoftschweiz","https://twitter.com/microsoft_ch","https://www.linkedin.com/company/1035","https://www.youtube.com/user/MicrosoftCH","https://www.instagram.com/microsoftch/"] equals www.twitter.com (Twitter)
Source: de-ch[1].htm.30.dr String found in binary or memory: "sameAs":["https://www.facebook.com/microsoftschweiz","https://twitter.com/microsoft_ch","https://www.linkedin.com/company/1035","https://www.youtube.com/user/MicrosoftCH","https://www.instagram.com/microsoftch/"] equals www.youtube.com (Youtube)
Source: de-ch[1].htm.30.dr String found in binary or memory: <a class="d-inline-block" href="https://www.facebook.com/microsoftschweiz" target="_blank" data-bi-ecn="Facebook" data-bi-bhvr="126" data-bi-cn="Facebook" data-bi-socchn="Facebook" data-bi-ct="Social Button" data-bi-pa="body" data-bi-compnm="Social Follow - horizontal"> equals www.facebook.com (Facebook)
Source: de-ch[1].htm.30.dr String found in binary or memory: <a class="d-inline-block" href="https://www.linkedin.com/company/1035" target="_blank" data-bi-ecn="LinkedIn" data-bi-bhvr="126" data-bi-cn="LinkedIn" data-bi-socchn="LinkedIn" data-bi-ct="Social Button" data-bi-pa="body" data-bi-compnm="Social Follow - horizontal"> equals www.linkedin.com (Linkedin)
Source: de-ch[1].htm.30.dr String found in binary or memory: <a class="d-inline-block" href="https://www.youtube.com/user/MicrosoftCH" target="_blank" data-bi-ecn="Youtube" data-bi-bhvr="126" data-bi-cn="Youtube" data-bi-socchn="Youtube" data-bi-ct="Social Button" data-bi-pa="body" data-bi-compnm="Social Follow - horizontal"> equals www.youtube.com (Youtube)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: w._comscore.push({"c1":"2","c2":"7241469","c5":2023538075,"c7":"https://www.yahoo.com/","c14":-1}); equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: var pixelDetectUrl = "https://www.yahoo.com/px.gif"; equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: {"@context":"http://schema.org","@type":"WebSite","url":"https://www.yahoo.com/","potentialAction":{"@type":"SearchAction","target":"https://search.yahoo.com/search?p={search_term_string}","query-input":"required name=search_term_string"}} equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: </script><noscript><img src=https://sb.scorecardresearch.com/p?c1=2&c2=7241469&c5=2023538075&c7=https%3A%2F%2Fwww.yahoo.com%2F&c14=-1></noscript><script type=text/javascript nonce=2dc40bb0e8f14317f55064956635585ba1e88d32ab41e65fae69eacc39bdd39b> equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: a cop said as Sean Bickings pleaded for help from the lake, according to the lawsuit.</p></div></div><div class="drawer-fetch-boundary Pos(r)"><div data-bucket="900" data-cfg="{&quot;adMeta&quot;:{&quot;adchoicesUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;advertiseWithUsUrl&quot;:&quot;https://www.ad.com/?utm_source=yahoo-home&amp;utm_medium=referral&amp;utm_campaign=ad-feedback&quot;,&quot;sponsoredUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;enableDrawerFeedback&quot;:false,&quot;enableAdLiteUpSellFeedback&quot;:true},&quot;features&quot;:{},&quot;i13n&quot;:{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;U.S.&quot;,&quot;cpos&quot;:4,&quot;cposy&quot;:9},&quot;intlFujiUiConfig&quot;:{&quot;roundedCorner&quot;:false,&quot;useVerticalControlIcons&quot;:false},&quot;xhrPathPrefix&quot;:&quot;/fp_ms/_rcv/remote&quot;,&quot;ncpParams&quot;:{&quot;query&quot;:{&quot;pageContext&quot;:{&quot;lu&quot;:0,&quot;pageType&quot;:&quot;home&quot;,&quot;site&quot;:&quot;fp&quot;,&quot;appName&quot;:&quot;megastrm&quot;}}}}" data-wf-boundary="drawer-fetch-boundary" data-wf-retry-count="1" data-wf-target=".drawer-fetch-target" data-wf-trigger="onLoad" data-wf-url="/fp_ms/_rcv/remote?m_mode=json&amp;m_id=react-wafer-stream&amp;ctrl=StreamRelated" class="stream-drawer Trsde(0.3s) Trsdu(0.7s) Trstf(eio) Trsp(max-height) Mah(0px) show-drawer_Mah(280px) D(n) drawer-beacon_D(b) Ov(h) stream-related-drawer"><div class="drawer-fetch-target"></div></div><div class="adfeedback-dialog"> </div></div></div></li><li class="stream-item js-stream-content Pos(r) Bgc(--white)" data-type="1" data-uuid="969f6d1f-cac6-3d42-bb9c-806e8c8cb86c" data-cpos="5" data-cposy="10" data-ycts="YMEDIA:CATEGORY=000000361,001000069,001000299,YMEDIA:CATEGORY=000000362,001000298,001000346,001000301" data-wikis="Ashton_Kutcher,Disposable_household_and_per_capita_income,Median_income,Upper_class,Pew_Research_Center" data-property="Business" data-i13n-cfg="{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Business&quot;,&quot;cpos&quot;:5,&quot;cposy&quot;:10}" data-test-locator="stream-item" data-yaft-module="stream_item_5"><div class="Mih(140px)"><div class="Py(12px) Pos(r) Cf"><div class="Fl(start) Pos(r) Mend(25px) Maw(220px) W(26%)"><div class="H(0) T(0px) Bdrs(2px) Start(0) Pos(r)" style="padding-bottom:55.91%" data-test-locator="stream-item-image"><a href="/finance/news/heres-net-worth-fall-americas-130000535.html" data-ylk="itc:0;elm:img;elmt:ct;imgt:ss;bpos:1;cpos:5;cposy:10;rspns:nav;t1:a3;t2:strm;t3:ct;ccode:megastream_unified__en-US__frontpage__default__default__desktop__ga__noSplit;ct:story;g:969f6d1f-cac6-3d42-bb9c-806e8c8cb86c;grpt:singlestory;pkgt:orphan_img;pos:1;cnt_tpc:Business;slk:Here&#x27;s the annual income you need to fall in America&#x27;s lower, middle, and upper class equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: </div><div class="C($streamItemGray) Fz(11px) Mt(2px) Va(b) D(ib)--md1160" data-test-locator="stream-cluster-pub">Variety</div></a></li></ul></div></div><div class="drawer-fetch-boundary Pos(r)"><div data-bucket="900" data-cfg="{&quot;adMeta&quot;:{&quot;adchoicesUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;advertiseWithUsUrl&quot;:&quot;https://www.ad.com/?utm_source=yahoo-home&amp;utm_medium=referral&amp;utm_campaign=ad-feedback&quot;,&quot;sponsoredUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;enableDrawerFeedback&quot;:false,&quot;enableAdLiteUpSellFeedback&quot;:true},&quot;features&quot;:{},&quot;i13n&quot;:{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Celebrity&quot;,&quot;cpos&quot;:19,&quot;cposy&quot;:38},&quot;intlFujiUiConfig&quot;:{&quot;roundedCorner&quot;:false,&quot;useVerticalControlIcons&quot;:false},&quot;xhrPathPrefix&quot;:&quot;/fp_ms/_rcv/remote&quot;,&quot;ncpParams&quot;:{&quot;query&quot;:{&quot;pageContext&quot;:{&quot;lu&quot;:0,&quot;pageType&quot;:&quot;home&quot;,&quot;site&quot;:&quot;fp&quot;,&quot;appName&quot;:&quot;megastrm&quot;}}}}" data-wf-boundary="drawer-fetch-boundary" data-wf-retry-count="1" data-wf-target=".drawer-fetch-target" data-wf-trigger="onLoad" data-wf-url="/fp_ms/_rcv/remote?m_mode=json&amp;m_id=react-wafer-stream&amp;ctrl=StreamRelated" class="stream-drawer Trsde(0.3s) Trsdu(0.7s) Trstf(eio) Trsp(max-height) Mah(0px) show-drawer_Mah(280px) D(n) drawer-beacon_D(b) Ov(h) stream-related-drawer"><div class="drawer-fetch-target"></div></div><div class="adfeedback-dialog"> </div></div></div></li><li class="stream-item js-stream-content Pos(r) Bgc(--white)" data-type="1" data-uuid="21efd28c-2ea4-3301-84f5-b72244af1f6b" data-cpos="20" data-cposy="41" data-ycts="001000031,001000069" data-wikis="Kate_Hudson,Goldie_Hawn" data-property="Celebrity" data-i13n-cfg="{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Celebrity&quot;,&quot;cpos&quot;:20,&quot;cposy&quot;:41}" data-test-locator="stream-item" data-yaft-module="stream_item_20"><div class="Mih(140px)"><div class="Py(12px) Pos(r) Cf"><div class="Fl(start) Pos(r) Mend(25px) Maw(220px) W(26%)"><div class="H(0) T(0px) Bdrs(2px) Start(0) Pos(r)" style="padding-bottom:55.91%" data-test-locator="stream-item-image"><a href="/news/kate-hudson-sunbathes-topless-warns-011924323.html" data-ylk="itc:0;elm:img;elmt:ct;imgt:ss;bpos:1;cpos:20;cposy:41;rspns:nav;t1:a3;t2:strm;t3:ct;ccode:megastream_unified__en-US__frontpage__default__default__desktop__ga__noSplit;ct:story;g:21efd28c-2ea4-3301-84f5-b72244af1f6b;grpt:singlestory;pkgt:orphan_img;pos:1;cnt_tpc:Celebrity;slk:Kate Hudson sunbathes topless, warns brother to unfollow her social media posts: equals www.yahoo.com (Yahoo)
Source: J7NKSXWB.htm.30.dr String found in binary or memory: </span><u class="StretchedBox"></u></a></h3><p class="LineClamp(2,38px) finance-ticker-fetch-success_D(n) sub-upsell-fetch-success_D(n) Fz(14px) Lh(18px) C($streamSummaryClass) M(0) Bxz(bb) Mb(12px)" data-test-locator="stream-item-summary">Kate Hudson engaged in family banter on Instagram after her brother Oliver screamed upon seeing his sister nearly naked while tanning by the pool without a top.</p></div></div><div class="drawer-fetch-boundary Pos(r)"><div data-bucket="900" data-cfg="{&quot;adMeta&quot;:{&quot;adchoicesUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;advertiseWithUsUrl&quot;:&quot;https://www.ad.com/?utm_source=yahoo-home&amp;utm_medium=referral&amp;utm_campaign=ad-feedback&quot;,&quot;sponsoredUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;enableDrawerFeedback&quot;:false,&quot;enableAdLiteUpSellFeedback&quot;:true},&quot;features&quot;:{},&quot;i13n&quot;:{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Celebrity&quot;,&quot;cpos&quot;:20,&quot;cposy&quot;:41},&quot;intlFujiUiConfig&quot;:{&quot;roundedCorner&quot;:false,&quot;useVerticalControlIcons&quot;:false},&quot;xhrPathPrefix&quot;:&quot;/fp_ms/_rcv/remote&quot;,&quot;ncpParams&quot;:{&quot;query&quot;:{&quot;pageContext&quot;:{&quot;lu&quot;:0,&quot;pageType&quot;:&quot;home&quot;,&quot;site&quot;:&quot;fp&quot;,&quot;appName&quot;:&quot;megastrm&quot;}}}}" data-wf-boundary="drawer-fetch-boundary" data-wf-retry-count="1" data-wf-target=".drawer-fetch-target" data-wf-trigger="onLoad" data-wf-url="/fp_ms/_rcv/remote?m_mode=json&amp;m_id=react-wafer-stream&amp;ctrl=StreamRelated" class="stream-drawer Trsde(0.3s) Trsdu(0.7s) Trstf(eio) Trsp(max-height) Mah(0px) show-drawer_Mah(280px) D(n) drawer-beacon_D(b) Ov(h) stream-related-drawer"><div class="drawer-fetch-target"></div></div><div class="adfeedback-dialog"> </div></div></div></li><li class="stream-item js-stream-content Pos(r) Bgc(--white)" data-type="1" data-uuid="a30448d9-3077-3ca5-a6b7-fbb569663620" data-cpos="21" data-cposy="42" data-ycts="001000661,001000700" data-wikis="Donald_Trump,Jus_soli,Rolling_Stone,Fourteenth_Amendment_to_the_United_States_Constitution,Illegal_immigration" data-property="Politics" data-has-cluster="true" data-i13n-cfg="{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Politics&quot;,&quot;cpos&quot;:21,&quot;cposy&quot;:42}" data-test-locator="stream-item" data-yaft-module="stream_item_21"><div class="Mih(140px)"><div class="Py(12px) Pos(r) Cf"><div class="Fl(start) Pos(r) Mend(25px) Maw(220px) W(26%)"><div class="H(0) T(0px) Bdrs(2px) Start(0) Pos(r)" style="padding-bottom:87.73%" data-test-locator="stream-item-image"><a href="/entertainment/trump-promises-violate-14th-amendment-193116065.html" data-ylk="itc:0;elm:img;elmt:ct;imgt:ss;bpos:1;cpos:21;cposy:42;rspns:nav;t1:a3;t2:strm;t3:ct;ccode:megastream_unified__en-US__frontpage__default__default__desktop__ga__noSplit;ct:story;g:a30448d9-3077-3ca5-a6
Source: J7NKSXWB.htm.30.dr String found in binary or memory: t lived!!!!</p></div></div><div class="drawer-fetch-boundary Pos(r)"><div data-bucket="900" data-cfg="{&quot;adMeta&quot;:{&quot;adchoicesUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;advertiseWithUsUrl&quot;:&quot;https://www.ad.com/?utm_source=yahoo-home&amp;utm_medium=referral&amp;utm_campaign=ad-feedback&quot;,&quot;sponsoredUrl&quot;:&quot;https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;,&quot;enableDrawerFeedback&quot;:false,&quot;enableAdLiteUpSellFeedback&quot;:true},&quot;features&quot;:{},&quot;i13n&quot;:{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Celebrity&quot;,&quot;cpos&quot;:11,&quot;cposy&quot;:22},&quot;intlFujiUiConfig&quot;:{&quot;roundedCorner&quot;:false,&quot;useVerticalControlIcons&quot;:false},&quot;xhrPathPrefix&quot;:&quot;/fp_ms/_rcv/remote&quot;,&quot;ncpParams&quot;:{&quot;query&quot;:{&quot;pageContext&quot;:{&quot;lu&quot;:0,&quot;pageType&quot;:&quot;home&quot;,&quot;site&quot;:&quot;fp&quot;,&quot;appName&quot;:&quot;megastrm&quot;}}}}" data-wf-boundary="drawer-fetch-boundary" data-wf-retry-count="1" data-wf-target=".drawer-fetch-target" data-wf-trigger="onLoad" data-wf-url="/fp_ms/_rcv/remote?m_mode=json&amp;m_id=react-wafer-stream&amp;ctrl=StreamRelated" class="stream-drawer Trsde(0.3s) Trsdu(0.7s) Trstf(eio) Trsp(max-height) Mah(0px) show-drawer_Mah(280px) D(n) drawer-beacon_D(b) Ov(h) stream-related-drawer"><div class="drawer-fetch-target"></div></div><div class="adfeedback-dialog"> </div></div></div></li><li class="stream-item js-stream-content Pos(r) Bgc(--white)" data-type="1" data-uuid="cc5ad19a-7ea9-397b-8d36-2e1249dcb91a" data-cpos="12" data-cposy="23" data-ycts="001000069,001000031" data-wikis="Pamela_Anderson,Khlo%c3%a9_Kardashian" data-property="Style" data-i13n-cfg="{&quot;bpos&quot;:1,&quot;categoryLabel&quot;:&quot;Style&quot;,&quot;cpos&quot;:12,&quot;cposy&quot;:23}" data-test-locator="stream-item" data-yaft-module="stream_item_12"><div class="Mih(140px)"><div class="Py(12px) Pos(r) Cf"><div class="Fl(start) Pos(r) Mend(25px) Maw(220px) W(26%)"><div class="H(0) T(0px) Bdrs(2px) Start(0) Pos(r)" style="padding-bottom:55.91%" data-test-locator="stream-item-image"><a href="/entertainment/leave-khlo-kardashian-eat-pamela-165840132.html" data-ylk="itc:0;elm:img;elmt:ct;imgt:ss;bpos:1;cpos:12;cposy:23;rspns:nav;t1:a3;t2:strm;t3:ct;ccode:megastream_unified__en-US__frontpage__default__default__desktop__ga__noSplit;ct:story;g:cc5ad19a-7ea9-397b-8d36-2e1249dcb91a;grpt:singlestory;pkgt:orphan_img;pos:1;cnt_tpc:Style;slk:Leave It to Khlo equals www.yahoo.com (Yahoo)
Source: 77EC63BDA74BD0D0E0426DC8F80085060.30.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: de-ch[1].htm.30.dr String found in binary or memory: http://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWO4yJ?ver=2ab3&quot;
Source: de-ch[1].htm.30.dr String found in binary or memory: http://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWOalS?ver=cc6e&quot;
Source: J7NKSXWB.htm.30.dr String found in binary or memory: http://schema.org
Source: de-ch[1].htm.30.dr String found in binary or memory: http://schema.org/Organization
Source: Amcache.hve.9.dr String found in binary or memory: http://upx.sf.net
Source: J7NKSXWB.htm.30.dr String found in binary or memory: http://www.opensource.org/licenses/mit-license.php
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830424%7C0%7C0%7CAdId=-41;BnId=0;ct=1864049394;st=
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830441%7C0%7C225%7CAdId=11101911;BnId=2;ct=1864049
Source: de-ch[1].htm.30.dr String found in binary or memory: https://accdn.lpsnmedia.net
Source: de-ch[1].htm.30.dr String found in binary or memory: https://aka.ms/yourcaliforniaprivacychoices
Source: de-ch[1].htm.30.dr String found in binary or memory: https://analytics.tiktok.com
Source: de-ch[1].htm.30.dr String found in binary or memory: https://cdnssl.clicktale.net
Source: de-ch[1].htm.30.dr String found in binary or memory: https://cdnssl.clicktale.net/www32/ptc/05d32363-d534-4d93-9b65-cde674775e71.js
Source: de-ch[1].htm.30.dr String found in binary or memory: https://d.impactradius-event.com
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://fp-graviton-home-gateway.media.yahoo.com/
Source: de-ch[1].htm.30.dr String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net
Source: de-ch[1].htm.30.dr String found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
Source: de-ch[1].htm.30.dr String found in binary or memory: https://js.monitor.azure.com
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html&quot;
Source: de-ch[1].htm.30.dr String found in binary or memory: https://login.live.com/me.srf?wa=wsignin1.0
Source: de-ch[1].htm.30.dr String found in binary or memory: https://lpcdn.lpsnmedia.net
Source: de-ch[1].htm.30.dr String found in binary or memory: https://lptag.liveperson.net
Source: de-ch[1].htm.30.dr String found in binary or memory: https://mem.gfx.ms
Source: de-ch[1].htm.30.dr String found in binary or memory: https://onedrive.live.com/about/de-ch/
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://openweb.jac.yahoosandbox.com
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://openweb.jac.yahoosandbox.com/1.5.0/jac.js
Source: de-ch[1].htm.30.dr String found in binary or memory: https://outlook.live.com/owa/
Source: de-ch[1].htm.30.dr String found in binary or memory: https://publisher.liveperson.net
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/aaq/hc/homepage-pwa-defer-1.1.6.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/aaq/nel/js/spotIm.custom.SpotIMJAC.modal.9d3270fa67932556c75baaed2c09c955.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/aaq/spotim/
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/aaq/vzm/cs_1.4.0.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/aaq/wf/wf-core-1.63.0.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/cx/pv/perf-vitals_3.1.0.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/nn/lib/metro/g/myy/advertisement_0.0.19.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/ss/rapid-3.53.38.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uc/sf/0.1.322/js/safe.min.js
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/2kRwuXH6fvmgKfpoQCf56g--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/4cg6h0vinH_o7ba.oxXthQ--~B/Zmk9c3RyaW07aD0zODg7cT05NTt3PTcyMDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/5BZN9wyvjM8FfgniQrH0uw--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/6DI2hkBaEy3aroPxqBStjQ--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/6lV3qkp5vhD2J.O5ha31Nw--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/7mz1gUykvPcUcalzuGE1WQ--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/GrbIGl3XT7cxPkRfHGfS9A--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/H3vVA32ymLk3HFF8J_ZI5w--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/c3dObtZQiIqjZKMWzeYQcw--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/fiFKhsorJ_.XzJNVa7HgsQ--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/h64YbbKcO2GsKYAy1QMRMw--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/k8SbH9Gqa6W8a7JKyncC.A--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/mzPB3eeJrxJuAn9uOhK0cA--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://s.yimg.com/uu/api/res/1.2/p68hnTLk2asTrmg6nFL37A--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://sb.scorecardresearch.com/p?c1=2&c2=7241469&c5=2023538075&c7=https%3A%2F%2Fwww.yahoo.com%2F&c
Source: de-ch[1].htm.30.dr String found in binary or memory: https://schema.org
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://search.yahoo.com/search?p=
Source: de-ch[1].htm.30.dr String found in binary or memory: https://start.microsoftapp.net/start?pc_campaign=UHF_Banner_15mkts&amp;adjust=y9xgnyl_5sblqid&quot;
Source: de-ch[1].htm.30.dr String found in binary or memory: https://twitter.com/microsoft_ch
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://www.ad.com/?utm_source=yahoo-home&amp;utm_medium=referral&amp;utm_campaign=ad-feedback&quot;
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.clarity.ms
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.instagram.com/microsoftch/
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.linkedin.com/company/1035
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.onenote.com/?omkt=de-CH
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.skype.com/de/
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.xbox.com/
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://www.yahoo.com/
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://www.yahoo.com/px.gif
Source: de-ch[1].htm.30.dr String found in binary or memory: https://www.youtube.com/user/MicrosoftCH
Source: de-ch[1].htm.30.dr String found in binary or memory: https://xboxdesignlab.xbox.com/xbox-design-lab?recipeId=G4E9FNSC&icid=mscom_marcom_CPH4a_PrideXDLcon
Source: J7NKSXWB.htm.30.dr String found in binary or memory: https://yep.video.yahoo.com/oath/js/1/oath-player.js?ypv=8.5.43&lang=en-US
Source: unknown DNS traffic detected: queries for: yahoo.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: yahoo.comCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheConnection: Keep-AliveHost: www.yahoo.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: www.yahoo.comConnection: Keep-Alive
Source: unknown HTTPS traffic detected: 54.161.105.65:443 -> 192.168.2.5:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.100.215:443 -> 192.168.2.5:49737 version: TLS 1.2
Source: loaddll32.exe, 00000000.00000002.410374276.00000000009BB000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: qbot1.dll Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: 19.2.rundll32.exe.2c60a28.1.unpack, type: UNPACKEDPE Matched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
Source: 19.2.rundll32.exe.29a0000.0.unpack, type: UNPACKEDPE Matched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
Source: 19.2.rundll32.exe.2c60a28.1.raw.unpack, type: UNPACKEDPE Matched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 656
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\Windows\AppCompat\Programs\Amcache.hve.tmp Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1002B980 3_2_1002B980
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1002C7F0 3_2_1002C7F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029B32F1 19_2_029B32F1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029B72EF 19_2_029B72EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029B8E20 19_2_029B8E20
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A3A40 19_2_029A3A40
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029B6F30 19_2_029B6F30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029B4B53 19_2_029B4B53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029ACAF3 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory, 19_2_029ACAF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029AAA38 GetLastError,NtResumeThread,FindCloseChangeNotification, 19_2_029AAA38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029B44D8 NtProtectVirtualMemory,NtProtectVirtualMemory, 19_2_029B44D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029AA51F NtAllocateVirtualMemory,NtWriteVirtualMemory, 19_2_029AA51F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029AA93E GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory, 19_2_029AA93E
Source: qbot1.dll Binary or memory string: OriginalFilenameAdobeExtendScript.dllD vs qbot1.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: winhttp.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: mswsock.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: rasadhlp.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: schannel.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: mskeyprotect.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: ncrypt.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: ntasn1.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: dpapi.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: gpapi.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: cryptnet.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: webio.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: cabinet.dll
Source: C:\Windows\SysWOW64\wermgr.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\msiexec.exe Section loaded: sfc.dll
Source: qbot1.dll Virustotal: Detection: 12%
Source: qbot1.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\qbot1.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0API@ScScript@@IAE@AAVEngine@1@H@Z
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 656
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6268 -s 660
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0BinaryNode@ScScript@@QAE@ABUScanInfo@1@PAVNode@1@1@Z
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 672
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0BreakpointInfo@ScScript@@QAE@ABV01@@Z
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 648
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0API@ScScript@@IAE@AAVEngine@1@H@Z
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0BinaryNode@ScScript@@QAE@ABUScanInfo@1@PAVNode@1@1@Z
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0BreakpointInfo@ScScript@@QAE@ABV01@@Z
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",next
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",munlockRef@Engine@ScScript@@QAEXABVVariant@ScCore@@@Z
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",mundefinedError@Callback@ScScript@@UAE_NAAVEngine@2@ABVVariant@ScCore@@1AAV45@@Z
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 652
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 652
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 648
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all
Source: C:\Windows\SysWOW64\ipconfig.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\whoami.exe whoami /all
Source: C:\Windows\SysWOW64\whoami.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0API@ScScript@@IAE@AAVEngine@1@H@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0BinaryNode@ScScript@@QAE@ABUScanInfo@1@PAVNode@1@1@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0BreakpointInfo@ScScript@@QAE@ABV01@@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0API@ScScript@@IAE@AAVEngine@1@H@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0BinaryNode@ScScript@@QAE@ABUScanInfo@1@PAVNode@1@1@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0BreakpointInfo@ScScript@@QAE@ABV01@@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",next Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",munlockRef@Engine@ScScript@@QAEXABVVariant@ScCore@@@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",mundefinedError@Callback@ScScript@@UAE_NAAVEngine@2@ABVVariant@ScCore@@1AAV45@@Z Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe Jump to behavior
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\whoami.exe whoami /all
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\SysWOW64\wermgr.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Zayfhyxjea
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B33.tmp Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winDLL@40/37@2/100
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029AD2F7 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket, 19_2_029AD2F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029AC800 CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification, 19_2_029AC800
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0API@ScScript@@IAE@AAVEngine@1@H@Z
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7156
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5044
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6356:120:WilError_01
Source: C:\Windows\SysWOW64\wermgr.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\{DAB8A7D0-9C66-4E50-8626-2C29CBC7F091}
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5500:120:WilError_01
Source: C:\Windows\SysWOW64\wermgr.exe Mutant created: \Sessions\1\BaseNamedObjects\{75B9B879-3461-496A-83BB-96D7E6BF196A}
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5428
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4332:120:WilError_01
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6336
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5772
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6268
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5444
Source: C:\Windows\SysWOW64\wermgr.exe Mutant created: \Sessions\1\BaseNamedObjects\{DAB8A7D0-9C66-4E50-8626-2C29CBC7F091}
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\wermgr.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\wermgr.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\wermgr.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\wermgr.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\wermgr.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: qbot1.dll Static PE information: More than 305 > 100 exports found
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: qbot1.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: qbot1.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000003.00000002.398530807.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.398962293.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.403691320.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.409151582.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.417454259.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.417658145.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.418188854.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.429703826.000000001006A000.00000002.00000001.01000000.00000003.sdmp, qbot1.dll
Source: Binary string: ExtendScript.pdb source: rundll32.exe, 00000003.00000002.398530807.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.398962293.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.403691320.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.409151582.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.417454259.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.417658145.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.418188854.000000001006A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.429703826.000000001006A000.00000002.00000001.01000000.00000003.sdmp, qbot1.dll
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1005C675 push ecx; ret 3_2_1005C688
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A93B8 LoadLibraryA,GetProcAddress, 19_2_029A93B8
Source: qbot1.dll Static PE information: real checksum: 0xd799f should be: 0xe6042

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all

Boot Survival

barindex
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\whoami.exe whoami /all
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\whoami.exe whoami /all

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Memory written: PID: 7148 base: 2B3C50 value: E9 63 D7 45 02 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wermgr.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wermgr.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wermgr.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wermgr.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\whoami.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\whoami.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from Win32_PhysicalMemory
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from Win32_PhysicalMemory
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from Win32_DiskDrive
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status from Win32_PnPEntity
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1236 Thread sleep count: 176 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from Win32_ComputerSystem
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from Win32_Bios
Source: C:\Windows\SysWOW64\wermgr.exe Process information queried: ProcessInformation
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100559A0 GetVersionExA,GetVersionExA,GetVersionExA,GetSystemInfo, 3_2_100559A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A9E70 FindFirstFileW,FindNextFileW, 19_2_029A9E70
Source: C:\Windows\System32\loaddll32.exe Thread delayed: delay time: 120000 Jump to behavior
Source: Amcache.hve.9.dr Binary or memory string: VMware
Source: Amcache.hve.9.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.9.dr Binary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.9.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.9.dr Binary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: Amcache.hve.9.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.dr Binary or memory string: VMware7,1
Source: Amcache.hve.9.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.dr Binary or memory string: VMware, Inc.me
Source: J7NKSXWB.htm.30.dr Binary or memory string: ;" aria-hidden="true" class="js-content-viewer rapidnofollow" tabindex="-1"><img class="W(100%) Bdrs(2px)" src="https://s.yimg.com/uu/api/res/1.2/GrbIGl3XT7cxPkRfHGfS9A--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHBpZD15dGFjaHlvbg--/https://media.zenfs.com/en/rollingstone.com/1559327ca430d396aaa47b044ff6e77a.cf.jpg" alt="" data-test-locator="stream-item-image"/></a></div> </div><div class="Pend(45px) Ov(h)"><div class="Fz(16px) Fw(b) Tt(c) D(ib) Mb(4px) Mend(9px) Lh(1) C($cat-politics)" data-test-locator="stream-item-category-label">Politics</div><div class="C($streamItemGray) Fz(12px) D(ib) Mb(4px) Lh(1)" id="stream-item-publisher_21" data-test-locator="stream-item-publisher">Rolling Stone</div><h3 class="LineClamp(2,2.6em) Mb(4px) Mb(0)--md1160 Mt(0) Lh(1.3) Fz(19px) stream-item-title" data-test-locator="stream-item-title"><a class="js-content-viewer rapidnofollow wafer-caas D(b) Td(n) Td(n):f C(--cobalt) C(--dory):h" data-uuid="a30448d9-3077-3ca5-a6b7-fbb569663620" href="/entertainment/trump-promises-violate-14th-amendment-193116065.html" data-ylk="itc:0;elm:hdln;elmt:ct;bpos:1;cpos:21;cposy:42;rspns:nav;t1:a3;t2:strm;t3:ct;ccode:megastream_unified__en-US__frontpage__default__default__desktop__ga__noSplit;ct:story;g:a30448d9-3077-3ca5-a6b7-fbb569663620;grpt:storyCluster;pkgt:cluster_all_img;pos:1;cnt_tpc:Politics;slk:Trump Promises to Violate 14th Amendment
Source: Amcache.hve.9.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.9.dr Binary or memory string: VMware-42 35 bb 32 33 75 d2 27-52 00 3c e2 4b d4 32 71
Source: Amcache.hve.9.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.9.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.18227214.B64.2106252220,BiosReleaseDate:06/25/2021,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1g
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1005C09A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_1005C09A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A93B8 LoadLibraryA,GetProcAddress, 19_2_029A93B8
Source: C:\Windows\SysWOW64\whoami.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\whoami.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\whoami.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100379BC mov eax, dword ptr fs:[00000030h] 3_2_100379BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_3_00882297 mov eax, dword ptr fs:[00000030h] 19_3_00882297
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A1015 mov eax, dword ptr fs:[00000030h] 19_2_029A1015
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029A21CD mov eax, dword ptr fs:[00000030h] 19_2_029A21CD
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001DD90 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk, 3_2_1001DD90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1005C09A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_1005C09A

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Memory written: C:\Windows\SysWOW64\wermgr.exe base: 2740000 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory written: C:\Windows\SysWOW64\wermgr.exe base: 2710000 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory written: C:\Windows\SysWOW64\wermgr.exe base: 2B3C50 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: C:\Windows\SysWOW64\wermgr.exe base: 2710000 protect: page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: C:\Windows\SysWOW64\wermgr.exe base: 2740000 protect: page read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory written: C:\Windows\SysWOW64\wermgr.exe base: 2710000 value starts with: 4D5A Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe Jump to behavior
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /all
Source: C:\Windows\SysWOW64\wermgr.exe Process created: C:\Windows\SysWOW64\whoami.exe whoami /all
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\wermgr.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\wermgr.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 19_2_029AC3B5 GetSystemTimeAsFileTime, 19_2_029AC3B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100060D0 mgetVersion@Engine@ScScript@@SAHXZ,mgetStackTrace@DebugAPI@ScScript@@QBE?AVString@ScCore@@HH@Z,mgetName@Engine@ScScript@@QBEABVString@ScCore@@XZ, 3_2_100060D0
Source: C:\Windows\SysWOW64\wermgr.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: rundll32.exe, 00000013.00000003.410719963.00000000048EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: bdagent.exe
Source: rundll32.exe, 00000013.00000003.410719963.00000000048EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: vsserv.exe
Source: rundll32.exe, 00000013.00000003.410719963.00000000048EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: avp.exe
Source: Amcache.hve.9.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.9.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: rundll32.exe, 00000013.00000003.410719963.00000000048EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: avgcsrvx.exe
Source: rundll32.exe, 00000013.00000003.410719963.00000000048EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: mcshield.exe
Source: rundll32.exe, 00000013.00000003.410719963.00000000048EF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: MsMpEng.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: 19.2.rundll32.exe.2c60a28.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.29a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2c60a28.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000013.00000002.424621480.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.425037724.0000000004870000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: 19.2.rundll32.exe.2c60a28.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.29a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2c60a28.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000013.00000002.424621480.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.425037724.0000000004870000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs