Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
042_qbot.dll

Overview

General Information

Sample Name:042_qbot.dll
Analysis ID:882771
MD5:8c18224b2fcb618bb4305a8687b3bb22
SHA1:c0a9a8cb468d0f9b185fa1112683612c01c60673
SHA256:d93d05a84c4d9579accd5dc839ee9f8f7e7f54c623e37175a59146664530dc3d
Infos:

Detection

Qbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Found evasive API chain (date check)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Connects to several IPs in different countries
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6544 cmdline: loaddll32.exe "C:\Users\user\Desktop\042_qbot.dll" MD5: 3B4636AE519868037940CA5C4272091B)
    • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6508 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5492 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 6704 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5492 -s 660 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6672 cmdline: rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_block_row MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5444 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7084 cmdline: rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_sample_rows MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6820 cmdline: rundll32.exe C:\Users\user\Desktop\042_qbot.dll,ldiv_round_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4736 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_block_row MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6972 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7008 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_sample_rows MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7016 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",ldiv_round_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7068 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",next MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • wermgr.exe (PID: 6052 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: CCF15E662ED5CE77B5FF1A7AAE305233)
    • rundll32.exe (PID: 2220 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lround_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 2408 cmdline: rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lpeg_write_tables MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6856 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "BB30", "Campaign": "1685686808", "Version": "404.1346", "C2 list": ["86.173.2.12:2222", "92.9.45.20:2222", "100.4.163.158:2222", "213.64.33.92:2222", "75.98.154.19:443", "78.192.109.105:2222", "88.126.94.4:50000", "70.28.50.223:2083", "92.154.17.149:2222", "24.234.220.88:993", "87.252.106.39:995", "174.4.89.3:443", "12.172.173.82:20", "90.29.86.138:2222", "70.160.67.203:443", "223.166.13.95:995", "184.181.75.148:443", "95.45.50.93:2222", "201.143.215.69:443", "64.121.161.102:443", "2.82.8.80:443", "188.28.19.84:443", "81.101.185.146:443", "79.77.142.22:2222", "84.215.202.8:443", "183.87.163.165:443", "74.12.147.139:2078", "74.12.147.139:2222", "74.12.147.139:2222", "74.12.147.139:2083", "70.28.50.223:2078", "94.204.202.106:443", "87.221.153.182:2222", "70.28.50.223:2087", "24.234.220.88:990", "2.49.63.160:2222", "72.205.104.134:443", "199.27.66.213:443", "83.249.198.100:2222", "90.104.151.37:2222", "116.75.63.183:443", "70.28.50.223:2078", "117.195.17.148:993", "77.126.99.230:443", "45.62.70.33:443", "24.234.220.88:465", "203.109.44.236:995", "75.109.111.89:443", "161.142.103.187:995", "77.86.98.236:443", "147.147.30.126:2222", "124.246.122.199:2222", "103.123.223.133:443", "180.151.19.13:2078", "176.142.207.63:443", "12.172.173.82:32101", "103.140.174.20:2222", "70.50.83.216:2222", "12.172.173.82:465", "38.2.18.164:443", "93.187.148.45:995", "70.64.77.115:443", "12.172.173.82:21", "70.49.205.198:2222", "27.0.48.233:443", "12.172.173.82:50001", "83.110.223.61:443", "103.141.50.43:995", "85.101.239.116:443", "103.42.86.42:995", "92.1.170.110:995", "81.229.117.95:2222", "124.122.47.148:443", "103.212.19.254:995", "103.139.242.6:443", "125.99.76.102:443", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "70.28.50.223:32100", "79.168.224.165:2222", "121.121.108.120:995", "69.160.121.6:61201", "200.84.211.255:2222", "201.244.108.183:995", "93.187.148.45:443", "85.61.165.153:2222", "184.182.66.109:443", "175.156.217.7:2222", "70.28.50.223:3389", "114.143.176.236:443", "65.95.141.84:2222", "80.6.50.34:443", "12.172.173.82:2087", "47.199.241.39:443", "66.241.183.99:443", "113.11.92.30:443", "186.75.95.6:443", "125.99.69.178:443", "109.130.247.84:2222", "96.56.197.26:2222", "70.50.1.252:2222", "91.160.70.68:32100", "67.70.120.249:2222", "209.171.160.69:995", "98.163.227.79:443", "176.133.4.230:995", "24.234.220.88:995", "45.62.75.250:443", "200.44.198.47:2222", "173.17.45.60:443", "5.192.141.228:2222", "184.63.133.131:995", "70.28.50.223:2083", "78.82.143.154:2222", "73.88.173.113:443", "181.4.225.225:443", "24.234.220.88:443", "174.58.146.57:443"]}
SourceRuleDescriptionAuthorStrings
00000012.00000002.567464865.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000012.00000002.567544507.00000000048E0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        18.2.rundll32.exe.10000000.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        18.2.rundll32.exe.10000000.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          18.2.rundll32.exe.bf0930.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xe055:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0x9c7b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          18.2.rundll32.exe.bf0930.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            18.2.rundll32.exe.bf0930.0.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000012.00000002.567464865.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685686808", "Version": "404.1346", "C2 list": ["86.173.2.12:2222", "92.9.45.20:2222", "100.4.163.158:2222", "213.64.33.92:2222", "75.98.154.19:443", "78.192.109.105:2222", "88.126.94.4:50000", "70.28.50.223:2083", "92.154.17.149:2222", "24.234.220.88:993", "87.252.106.39:995", "174.4.89.3:443", "12.172.173.82:20", "90.29.86.138:2222", "70.160.67.203:443", "223.166.13.95:995", "184.181.75.148:443", "95.45.50.93:2222", "201.143.215.69:443", "64.121.161.102:443", "2.82.8.80:443", "188.28.19.84:443", "81.101.185.146:443", "79.77.142.22:2222", "84.215.202.8:443", "183.87.163.165:443", "74.12.147.139:2078", "74.12.147.139:2222", "74.12.147.139:2222", "74.12.147.139:2083", "70.28.50.223:2078", "94.204.202.106:443", "87.221.153.182:2222", "70.28.50.223:2087", "24.234.220.88:990", "2.49.63.160:2222", "72.205.104.134:443", "199.27.66.213:443", "83.249.198.100:2222", "90.104.151.37:2222", "116.75.63.183:443", "70.28.50.223:2078", "117.195.17.148:993", "77.126.99.230:443", "45.62.70.33:443", "24.234.220.88:465", "203.109.44.236:995", "75.109.111.89:443", "161.142.103.187:995", "77.86.98.236:443", "147.147.30.126:2222", "124.246.122.199:2222", "103.123.223.133:443", "180.151.19.13:2078", "176.142.207.63:443", "12.172.173.82:32101", "103.140.174.20:2222", "70.50.83.216:2222", "12.172.173.82:465", "38.2.18.164:443", "93.187.148.45:995", "70.64.77.115:443", "12.172.173.82:21", "70.49.205.198:2222", "27.0.48.233:443", "12.172.173.82:50001", "83.110.223.61:443", "103.141.50.43:995", "85.101.239.116:443", "103.42.86.42:995", "92.1.170.110:995", "81.229.117.95:2222", "124.122.47.148:443", "103.212.19.254:995", "103.139.242.6:443", "125.99.76.102:443", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "70.28.50.223:32100", "79.168.224.165:2222", "121.121.108.120:995", "69.160.121.6:61201", "200.84.211.255:2222", "201.244.108.183:995", "93.187.148.45:443", "85.61.165.153:2222", "184.182.66.109:443", "175.156.217.7:2222", "70.28.50.223:3389", "114.143.176.236:443", "65.95.141.84:2222", "80.6.50.34:443", "12.172.173.82:2087", "47.199.241.39:443", "66.241.183.99:443", "113.11.92.30:443", "186.75.95.6:443", "125.99.69.178:443", "109.130.247.84:2222", "96.56.197.26:2222", "70.50.1.252:2222", "91.160.70.68:32100", "67.70.120.249:2222", "209.171.160.69:995", "98.163.227.79:443", "176.133.4.230:995", "24.234.220.88:995", "45.62.75.250:443", "200.44.198.47:2222", "173.17.45.60:443", "5.192.141.228:2222", "184.63.133.131:995", "70.28.50.223:2083", "78.82.143.154:2222", "73.88.173.113:443", "181.4.225.225:443", "24.234.220.88:443", "174.58.146.57:443"]}
            Source: 042_qbot.dllReversingLabs: Detection: 58%
            Source: 042_qbot.dllVirustotal: Detection: 62%Perma Link
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: netstat -nao
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: runas
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ipconfig /all
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: net localgroup
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Microsoft
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELF_TEST_1
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: p%08x
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Self test FAILED!!!
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Self test OK.
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: /t5
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: whoami /all
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: cmd
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: route print
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .lnk
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: arp -a
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: net share
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: cmd.exe /c set
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Self check
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %u;%u;%u;
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ProfileImagePath
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ProgramData
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Self check ok!
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: powershell.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: qwinsta
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: net view
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Component_08
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Start screenshot
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: appidapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: c:\ProgramData
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Component_07
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: powershell.exe -encodedCommand
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: netstat -nao
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: runas
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ipconfig /all
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SystemRoot
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: cscript.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: image/jpeg
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: LocalLow
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: displayName
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: shlwapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CommandLine
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: kernel32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: 1234567890
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wbj.go
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_DiskDrive
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: System32
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Name
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: WRSA.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: c:\\
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SpyNetReporting
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: FALSE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aswhookx.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Packages
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: RepUx.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Winsta0
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: root\SecurityCenter2
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: MsMpEng.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: userenv.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: csc_ui.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: \\.\pipe\
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: pstorec.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: NTUSER.DAT
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: from
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: netapi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: gdi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: setupapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: iphlpapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CrAmTray.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: user32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: \sf2.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Software\Microsoft
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %S.%06d
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: bcrypt.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wtsapi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: shell32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: TRUE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_Bios
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: */*
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ByteFence.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: type=0x%04X
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ROOT\CIMV2
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: https
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: fshoster32.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: kernelbase.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: regsvr32.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %s\system32\
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_Process
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: rundll32.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: LOCALAPPDATA
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: cmd.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: APPDATA
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: select
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: mcshield.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: advapi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ws2_32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .cfg
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_Product
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: WQL
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wininet.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: LastBootUpTime
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: urlmon.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Create
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_PnPEntity
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Initializing database...
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: winsta0\default
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .dat
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: WBJ_IGNORE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: next
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wpcap.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: image/pjpeg
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: fmon.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: vbs
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aswhooka.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SysWOW64
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: mpr.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: image/gif
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: crypt32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ntdll.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: open
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SystemRoot
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: cscript.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: C:\INTERNAL\__empty
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_PhysicalMemory
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ALLUSERSPROFILE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: image/jpeg
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: LocalLow
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: displayName
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: shlwapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CommandLine
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: kernel32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SubmitSamplesConsent
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: 1234567890
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wbj.go
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_DiskDrive
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: System32
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Name
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: WRSA.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: c:\\
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SpyNetReporting
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: FALSE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aswhookx.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Packages
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: application/x-shockwave-flash
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: RepUx.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Winsta0
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: avp.exe;kavtray.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: root\SecurityCenter2
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: MsMpEng.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: userenv.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: csc_ui.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: \\.\pipe\
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: pstorec.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: NTUSER.DAT
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: from
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: netapi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: gdi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: setupapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: iphlpapi.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CrAmTray.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_ComputerSystem
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: user32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: \sf2.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: egui.exe;ekrn.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Software\Microsoft
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %S.%06d
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: bcrypt.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wtsapi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: shell32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: TRUE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_Bios
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: c:\hiberfil.sysss
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: */*
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ByteFence.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: type=0x%04X
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: snxhk_border_mywnd
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ROOT\CIMV2
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: https
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: fshoster32.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: kernelbase.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: regsvr32.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %s\system32\
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_Process
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: rundll32.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: LOCALAPPDATA
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: cmd.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: APPDATA
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: select
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: mcshield.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: advapi32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ws2_32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .cfg
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_Product
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: WQL
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wininet.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: LastBootUpTime
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: urlmon.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Create
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Win32_PnPEntity
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Initializing database...
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: winsta0\default
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: .dat
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: WBJ_IGNORE
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: next
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: wpcap.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: image/pjpeg
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: fmon.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: vbs
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: aswhooka.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: SysWOW64
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: mpr.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: image/gif
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: crypt32.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: ntdll.dll
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: open
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 18.2.rundll32.exe.10000000.1.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 042_qbot.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10009E70 FindFirstFileW,FindNextFileW,

            Networking

            barindex
            Source: Malware configuration extractorIPs: 86.173.2.12:2222
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 100.4.163.158:2222
            Source: Malware configuration extractorIPs: 213.64.33.92:2222
            Source: Malware configuration extractorIPs: 75.98.154.19:443
            Source: Malware configuration extractorIPs: 78.192.109.105:2222
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 24.234.220.88:993
            Source: Malware configuration extractorIPs: 87.252.106.39:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 90.29.86.138:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 201.143.215.69:443
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 74.12.147.139:2078
            Source: Malware configuration extractorIPs: 74.12.147.139:2222
            Source: Malware configuration extractorIPs: 74.12.147.139:2222
            Source: Malware configuration extractorIPs: 74.12.147.139:2083
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 94.204.202.106:443
            Source: Malware configuration extractorIPs: 87.221.153.182:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 24.234.220.88:990
            Source: Malware configuration extractorIPs: 2.49.63.160:2222
            Source: Malware configuration extractorIPs: 72.205.104.134:443
            Source: Malware configuration extractorIPs: 199.27.66.213:443
            Source: Malware configuration extractorIPs: 83.249.198.100:2222
            Source: Malware configuration extractorIPs: 90.104.151.37:2222
            Source: Malware configuration extractorIPs: 116.75.63.183:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 117.195.17.148:993
            Source: Malware configuration extractorIPs: 77.126.99.230:443
            Source: Malware configuration extractorIPs: 45.62.70.33:443
            Source: Malware configuration extractorIPs: 24.234.220.88:465
            Source: Malware configuration extractorIPs: 203.109.44.236:995
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 124.246.122.199:2222
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 180.151.19.13:2078
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 70.50.83.216:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 38.2.18.164:443
            Source: Malware configuration extractorIPs: 93.187.148.45:995
            Source: Malware configuration extractorIPs: 70.64.77.115:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 70.49.205.198:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 103.141.50.43:995
            Source: Malware configuration extractorIPs: 85.101.239.116:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 92.1.170.110:995
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 103.212.19.254:995
            Source: Malware configuration extractorIPs: 103.139.242.6:443
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 121.121.108.120:995
            Source: Malware configuration extractorIPs: 69.160.121.6:61201
            Source: Malware configuration extractorIPs: 200.84.211.255:2222
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 93.187.148.45:443
            Source: Malware configuration extractorIPs: 85.61.165.153:2222
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 175.156.217.7:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 47.199.241.39:443
            Source: Malware configuration extractorIPs: 66.241.183.99:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 125.99.69.178:443
            Source: Malware configuration extractorIPs: 109.130.247.84:2222
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 70.50.1.252:2222
            Source: Malware configuration extractorIPs: 91.160.70.68:32100
            Source: Malware configuration extractorIPs: 67.70.120.249:2222
            Source: Malware configuration extractorIPs: 209.171.160.69:995
            Source: Malware configuration extractorIPs: 98.163.227.79:443
            Source: Malware configuration extractorIPs: 176.133.4.230:995
            Source: Malware configuration extractorIPs: 24.234.220.88:995
            Source: Malware configuration extractorIPs: 45.62.75.250:443
            Source: Malware configuration extractorIPs: 200.44.198.47:2222
            Source: Malware configuration extractorIPs: 173.17.45.60:443
            Source: Malware configuration extractorIPs: 5.192.141.228:2222
            Source: Malware configuration extractorIPs: 184.63.133.131:995
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 78.82.143.154:2222
            Source: Malware configuration extractorIPs: 73.88.173.113:443
            Source: Malware configuration extractorIPs: 181.4.225.225:443
            Source: Malware configuration extractorIPs: 24.234.220.88:443
            Source: Malware configuration extractorIPs: 174.58.146.57:443
            Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: unknownNetwork traffic detected: IP country count 26
            Source: 042_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: 042_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
            Source: 042_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
            Source: 042_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: 042_qbot.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: 042_qbot.dllString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: 042_qbot.dllString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
            Source: 042_qbot.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: 042_qbot.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: 042_qbot.dllString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: 042_qbot.dllString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
            Source: 042_qbot.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: 042_qbot.dllString found in binary or memory: http://ocsp.digicert.com0C
            Source: 042_qbot.dllString found in binary or memory: http://ocsp.digicert.com0H
            Source: 042_qbot.dllString found in binary or memory: http://ocsp.digicert.com0I
            Source: 042_qbot.dllString found in binary or memory: http://ocsp.digicert.com0O
            Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
            Source: 042_qbot.dllString found in binary or memory: http://www.digicert.com/CPS0
            Source: 042_qbot.dllString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
            Source: 042_qbot.dllString found in binary or memory: https://www.digicert.com/CPS0
            Source: loaddll32.exe, 00000000.00000002.816617240.00000000009EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: 042_qbot.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: 18.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 18.2.rundll32.exe.bf0930.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 18.2.rundll32.exe.bf0930.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 652
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\Windows\AppCompat\Programs\Amcache.hve.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADAACE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADA6880
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10018E20
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10003A40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_100172EF
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_100132F1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10016F30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10014B53
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_100144D8 NtProtectVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000A51F NtAllocateVirtualMemory,NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000A93E GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000AA38 GetLastError,NtResumeThread,FindCloseChangeNotification,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000CAF3 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: 042_qbot.dllStatic PE information: Number of sections : 15 > 10
            Source: 042_qbot.dllReversingLabs: Detection: 58%
            Source: 042_qbot.dllVirustotal: Detection: 62%
            Source: 042_qbot.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\042_qbot.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_block_row
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5492 -s 660
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lround_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lpeg_write_tables
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lround_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lpeg_write_tables
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\wermgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Riwowa
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER80BC.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winDLL@30/19@0/99
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000D2F7 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000C800 CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_block_row
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{D5E47010-4C75-4069-9871-1D73BE437D74}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{59E7A5C6-DD83-473C-9D00-5DD92E4108AF}
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_01
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5492
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6672
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4736
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2408
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{D5E47010-4C75-4069-9871-1D73BE437D74}
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: 042_qbot.dllStatic PE information: More than 104 > 100 exports found
            Source: 042_qbot.dllStatic PE information: Image base 0x6ad80000 > 0x60000000
            Source: 042_qbot.dllStatic PE information: section name: /4
            Source: 042_qbot.dllStatic PE information: section name: /14
            Source: 042_qbot.dllStatic PE information: section name: /29
            Source: 042_qbot.dllStatic PE information: section name: /41
            Source: 042_qbot.dllStatic PE information: section name: /55
            Source: 042_qbot.dllStatic PE information: section name: /67
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD814B0 GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,
            Source: 042_qbot.dllStatic PE information: real checksum: 0xc341d should be: 0xbf9af

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6052 base: 63C50 value: E9 63 D7 20 03
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXET_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEL_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXEU_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXES_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXET_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXET_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXET_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXER_
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
            Source: wermgr.exe, 00000018.00000003.567653631.0000000004FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 7076Thread sleep count: 181 > 30
            Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000B967 GetSystemInfo,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10009E70 FindFirstFileW,FindNextFileW,
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
            Source: Amcache.hve.8.drBinary or memory string: VMware
            Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: Amcache.hve.8.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.8.drBinary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
            Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
            Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.8.drBinary or memory string: VMware7,1
            Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.me
            Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.18227214.B64.2106252220,BiosReleaseDate:06/25/2021,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD814B0 GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD81F50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10001015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_100021CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADC5370 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,EnterCriticalSection,TlsGetValue,GetLastError,TlsGetValue,GetLastError,LeaveCriticalSection,

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 32A0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 3270000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 63C50
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 3270000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 32A0000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 3270000 value starts with: 4D5A
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADB3D50 cpuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADC52A0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000BC31 GetCurrentProcessId,GetLastError,GetVersionExA,GetWindowsDirectoryW,
            Source: rundll32.exe, 00000012.00000003.559900175.000000000495F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: rundll32.exe, 00000012.00000003.559900175.000000000495F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
            Source: rundll32.exe, 00000012.00000003.559900175.000000000495F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: rundll32.exe, 00000012.00000003.559900175.000000000495F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
            Source: rundll32.exe, 00000012.00000003.559900175.000000000495F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: rundll32.exe, 00000012.00000003.559900175.000000000495F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 18.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 18.2.rundll32.exe.bf0930.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 18.2.rundll32.exe.bf0930.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000012.00000002.567464865.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.567544507.00000000048E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 18.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 18.2.rundll32.exe.bf0930.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 18.2.rundll32.exe.bf0930.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000012.00000002.567464865.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.567544507.00000000048E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts3
            Native API
            Path Interception311
            Process Injection
            11
            Masquerading
            1
            Credential API Hooking
            1
            System Time Discovery
            Remote Services1
            Credential API Hooking
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
            Virtualization/Sandbox Evasion
            1
            Input Capture
            121
            Security Software Discovery
            Remote Desktop Protocol1
            Input Capture
            Exfiltration Over Bluetooth1
            Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)311
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Archive Collected Data
            Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Rundll32
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync24
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 882771 Sample: 042_qbot.dll Startdate: 06/06/2023 Architecture: WINDOWS Score: 100 32 103.212.19.254 VNET-ASVNETNETWORKSPVTLTDIN India 2->32 34 184.63.133.131 VIASAT-SP-BACKBONEUS United States 2->34 36 97 other IPs or domains 2->36 38 Found malware configuration 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Yara detected Qbot 2->42 44 3 other signatures 2->44 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 cmd.exe 1 9->14         started        16 rundll32.exe 9->16         started        18 8 other processes 9->18 signatures6 46 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->46 48 Writes to foreign memory regions 11->48 50 Allocates memory in foreign processes 11->50 52 Injects a PE file into a foreign processes 11->52 20 wermgr.exe 11->20         started        22 rundll32.exe 14->22         started        24 WerFault.exe 4 9 16->24         started        26 WerFault.exe 2 9 18->26         started        28 WerFault.exe 9 18->28         started        process7 process8 30 WerFault.exe 24 10 22->30         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            042_qbot.dll58%ReversingLabsWin32.Trojan.Zusy
            042_qbot.dll63%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://upx.sf.netAmcache.hve.8.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              38.2.18.164
              unknownUnited States
              174COGENT-174UStrue
              2.82.8.80
              unknownPortugal
              3243MEO-RESIDENCIALPTtrue
              70.160.67.203
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              83.110.223.61
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              209.171.160.69
              unknownCanada
              852ASN852CAtrue
              84.215.202.8
              unknownNorway
              41164GET-NOGETNorwayNOtrue
              184.182.66.109
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              200.84.211.255
              unknownVenezuela
              8048CANTVServiciosVenezuelaVEtrue
              125.99.69.178
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              174.4.89.3
              unknownCanada
              6327SHAWCAtrue
              121.121.108.120
              unknownMalaysia
              9534MAXIS-AS1-APBinariangBerhadMYtrue
              161.142.103.187
              unknownMalaysia
              9930TTNET-MYTIMEdotComBerhadMYtrue
              213.64.33.92
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              114.143.176.236
              unknownIndia
              17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
              24.234.220.88
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              67.70.120.249
              unknownCanada
              577BACOMCAtrue
              73.88.173.113
              unknownUnited States
              7922COMCAST-7922UStrue
              72.205.104.134
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              117.195.17.148
              unknownIndia
              9829BSNL-NIBNationalInternetBackboneINtrue
              69.160.121.6
              unknownJamaica
              33576DIG001JMtrue
              176.133.4.230
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              183.87.163.165
              unknownIndia
              132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
              184.181.75.148
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              70.49.205.198
              unknownCanada
              577BACOMCAtrue
              87.221.153.182
              unknownSpain
              12479UNI2-ASEStrue
              70.50.1.252
              unknownCanada
              577BACOMCAtrue
              85.101.239.116
              unknownTurkey
              9121TTNETTRtrue
              181.4.225.225
              unknownArgentina
              7303TelecomArgentinaSAARtrue
              100.4.163.158
              unknownUnited States
              701UUNETUStrue
              103.141.50.43
              unknownIndia
              133693SKISP-AS-INSriKrishnaInternetServicesPrivateLimitedItrue
              70.50.83.216
              unknownCanada
              577BACOMCAtrue
              92.1.170.110
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              64.121.161.102
              unknownUnited States
              6079RCN-ASUStrue
              96.56.197.26
              unknownUnited States
              6128CABLE-NET-1UStrue
              188.28.19.84
              unknownUnited Kingdom
              206067H3GUKGBtrue
              125.99.76.102
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              81.101.185.146
              unknownUnited Kingdom
              5089NTLGBtrue
              116.75.63.183
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              124.246.122.199
              unknownSingapore
              63850ENTRUSTICT-AS-APQRHUBPTYLTDTAEntrustICTAUtrue
              147.147.30.126
              unknownUnited Kingdom
              6871PLUSNETUKInternetServiceProviderGBtrue
              109.130.247.84
              unknownBelgium
              5432PROXIMUS-ISP-ASBEtrue
              75.109.111.89
              unknownUnited States
              19108SUDDENLINK-COMMUNICATIONSUStrue
              88.126.94.4
              unknownFrance
              12322PROXADFRtrue
              124.122.47.148
              unknownThailand
              17552TRUE-AS-APTrueInternetCoLtdTHtrue
              66.241.183.99
              unknownUnited States
              16604HUNTEL-NETUStrue
              180.151.19.13
              unknownIndia
              10029SHYAMSPECTRA-ASSHYAMSPECTRAPVTLTDINtrue
              94.204.202.106
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              47.205.25.170
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              95.45.50.93
              unknownIreland
              5466EIRCOMInternetHouseIEtrue
              103.212.19.254
              unknownIndia
              132956VNET-ASVNETNETWORKSPVTLTDINtrue
              85.61.165.153
              unknownSpain
              12479UNI2-ASEStrue
              91.160.70.68
              unknownFrance
              12322PROXADFRtrue
              201.143.215.69
              unknownMexico
              8151UninetSAdeCVMXtrue
              184.63.133.131
              unknownUnited States
              7155VIASAT-SP-BACKBONEUStrue
              203.109.44.236
              unknownIndia
              135777NECONN-ASShreenortheastConnectAndServicesPvtLtdINtrue
              90.104.151.37
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              201.244.108.183
              unknownColombia
              19429ETB-ColombiaCOtrue
              2.49.63.160
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              103.42.86.42
              unknownIndia
              133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
              80.6.50.34
              unknownUnited Kingdom
              5089NTLGBtrue
              175.156.217.7
              unknownSingapore
              4773MOBILEONELTD-AS-APMobileOneLtdMobileInternetServicePrtrue
              103.139.242.6
              unknownIndia
              138798MUTINY-AS-INMutinySystemsPrivateLimitedINtrue
              27.0.48.233
              unknownIndia
              132573SAINGN-AS-INSAINGNNetworkServicesINtrue
              70.28.50.223
              unknownCanada
              577BACOMCAtrue
              173.17.45.60
              unknownUnited States
              30036MEDIACOM-ENTERPRISE-BUSINESSUStrue
              81.229.117.95
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              70.64.77.115
              unknownCanada
              6327SHAWCAtrue
              87.252.106.39
              unknownItaly
              48544TECNOADSL-ASITtrue
              79.77.142.22
              unknownUnited Kingdom
              9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
              98.163.227.79
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              93.187.148.45
              unknownUnited Kingdom
              8680SURE-INTERNATIONAL-LIMITEDGBtrue
              186.75.95.6
              unknownPanama
              11556CableWirelessPanamaPAtrue
              50.68.186.195
              unknownCanada
              6327SHAWCAtrue
              45.62.70.33
              unknownCanada
              40440NRTC-CAtrue
              83.249.198.100
              unknownSweden
              39651COMHEM-SWEDENSEtrue
              12.172.173.82
              unknownUnited States
              2386INS-ASUStrue
              47.199.241.39
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              79.168.224.165
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              199.27.66.213
              unknownUnited States
              40608HCTNEBRASKAUStrue
              200.44.198.47
              unknownVenezuela
              8048CANTVServiciosVenezuelaVEtrue
              176.142.207.63
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              86.173.2.12
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              45.62.75.250
              unknownCanada
              40440NRTC-CAtrue
              92.154.17.149
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              90.29.86.138
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              174.58.146.57
              unknownUnited States
              7922COMCAST-7922UStrue
              223.166.13.95
              unknownChina
              17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
              5.192.141.228
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              65.95.141.84
              unknownCanada
              577BACOMCAtrue
              75.98.154.19
              unknownUnited States
              32444SAFELINK-MVUStrue
              77.126.99.230
              unknownIsrael
              9116GOLDENLINES-ASNPartnerCommunicationsMainAutonomousSystetrue
              103.123.223.133
              unknownIndia
              138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
              74.12.147.139
              unknownCanada
              577BACOMCAtrue
              92.9.45.20
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              113.11.92.30
              unknownBangladesh
              7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
              77.86.98.236
              unknownUnited Kingdom
              12390KINGSTON-UK-ASGBtrue
              103.140.174.20
              unknownIndia
              138763PRAVEEN1-ASPraveenTelecomPvtLtdINtrue
              78.192.109.105
              unknownFrance
              12322PROXADFRtrue
              78.82.143.154
              unknownSweden
              2119TELENOR-NEXTELTelenorNorgeASNOtrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:882771
              Start date and time:2023-06-06 19:09:43 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 10m 12s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Run name:Run with higher sleep bypass
              Number of analysed new started processes analysed:25
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:042_qbot.dll
              Detection:MAL
              Classification:mal100.troj.evad.winDLL@30/19@0/99
              EGA Information:
              • Successful, ratio: 50%
              HDC Information:
              • Successful, ratio: 27.4% (good quality ratio 26.1%)
              • Quality average: 78.2%
              • Quality standard deviation: 25.4%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .dll
              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
              • Exclude process from analysis (whitelisted): audiodg.exe, WerFault.exe, WMIADAP.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.42.65.92, 52.168.117.173
              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, watson.telemetry.microsoft.com
              • Execution Graph export aborted for target rundll32.exe, PID 6672 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              No simulations
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9057341144751101
              Encrypted:false
              SSDEEP:192:/Fig40oXqHBUZMX4jed+P/u7s1S274ItWc:9ig+XCBUZMX4jeq/u7s1X4ItWc
              MD5:05E44EBD63F69726AB4044D9396952EC
              SHA1:169B90102FB83816A278DDA150DF194692F2A1C0
              SHA-256:5D72F02B3964A950C7515A1110F5DB10215741C062EE12582F839F5BC43AF8FE
              SHA-512:5DB81DC3421A948BF1D8B75EAC98B702500019EED8F5A4F1BD1AD467E7FD281B3085C3535BC498E69A793BBCF0F64706A454598A9F744703D7399ED5D4038CB7
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.4.5.0.3.8.2.6.2.9.2.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.4.5.0.3.9.2.6.2.9.1.7.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.f.0.1.5.a.0.b.-.d.1.4.6.-.4.a.7.d.-.9.1.e.0.-.3.5.0.1.c.e.7.2.3.c.3.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.2.1.7.e.4.5.c.-.e.c.f.e.-.4.4.d.6.-.a.6.4.d.-.c.d.8.e.8.7.d.8.7.6.f.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.1.0.-.0.0.0.1.-.0.0.1.f.-.9.4.4.f.-.0.c.d.0.9.9.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9060923660883311
              Encrypted:false
              SSDEEP:192:6Ti/40oXUHBUZMX4jed+P/u7s1S274ItWc:mi/+XcBUZMX4jeq/u7s1X4ItWc
              MD5:6DF6F67AFD8794F3FF6BE13469E2517D
              SHA1:2D1C10617E7509552E71D86BA68B2A8CC84F3012
              SHA-256:2E2994CEDB2AA77FD68C56BE3F908B63C08F0DE379B9E52F1E755C137749DD44
              SHA-512:475281A6DC28B9D54ECAF41258DA40DF34094512BE3DE95A39B635D296CF077F9D17A83E75B29D4C5CBCFE5A2160B064F9DD6BA968F9A9C27F8515FF79BB2BAF
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.4.5.0.3.8.0.9.5.4.7.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.4.5.0.3.9.2.5.1.7.1.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.e.b.7.2.3.5.1.-.7.6.b.6.-.4.3.f.3.-.9.2.7.c.-.e.a.2.3.d.6.0.2.b.6.c.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.f.9.b.b.5.1.-.8.5.c.5.-.4.c.c.8.-.b.e.8.6.-.6.7.d.c.e.3.e.8.6.7.b.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.7.4.-.0.0.0.1.-.0.0.1.f.-.e.a.6.3.-.0.f.d.0.9.9.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9059401035846044
              Encrypted:false
              SSDEEP:192:YK+ir40oXHHBUZMX4jed+P/u7s1S274ItWc:Ybir+XnBUZMX4jeq/u7s1X4ItWc
              MD5:4A9A720F38328BB1EF5E04112471741D
              SHA1:DAAFEE12DA07D2FE265F63F768360C6400B3E0B3
              SHA-256:8D70C9F95F1905A9730A376D91EE98752EBA79DAD3073C9E8E2F9C6A458E9292
              SHA-512:80269EEE9CA2ED8076DB8940327FD3CD8A6E0CAE8A95F4BA240F98DFB76D6C88486896A73E5CA5FE5D9273BF7D1A8093DCD3359B4A80BF0D46AB4CF3750017FA
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.4.5.0.4.7.4.4.1.7.0.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.4.5.0.4.8.3.3.2.3.6.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.e.8.9.6.6.2.-.c.d.b.2.-.4.c.0.c.-.b.e.c.d.-.a.b.4.b.b.7.0.9.5.e.3.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.7.7.3.c.f.3.-.3.5.c.7.-.4.f.1.6.-.a.d.1.a.-.4.8.2.1.1.e.4.5.e.d.b.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.8.0.-.0.0.0.1.-.0.0.1.f.-.e.8.6.8.-.7.f.d.5.9.9.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9059262105045623
              Encrypted:false
              SSDEEP:192:Czipl40oXAHBUZMX4jed+P/u7s1S274ItWc:Oir+XoBUZMX4jeq/u7s1X4ItWc
              MD5:B47FCE3047344522A0216019B65C64EB
              SHA1:642D0EBB93A342E8F397866068C71E73D01EE1E6
              SHA-256:A9C4529AED8E4CEEFA1C4583FD7860D323CFF954FE305E939D97296B77E82A3B
              SHA-512:E844C5957C7AD3BCACE241B5677AC7CB09FF81088ECBCC72A42605C3568F9A719B92B6BCDEE75B5BB49E0AA781693FE9263B445A76235BAF6C4A30AA6C7F88E8
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.4.5.0.4.7.6.5.0.7.5.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.4.5.0.4.8.5.5.6.9.9.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.f.c.8.d.5.7.e.-.6.e.d.a.-.4.0.4.6.-.8.8.4.2.-.f.3.0.8.e.d.e.4.1.3.e.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.2.d.a.8.0.c.-.7.5.7.7.-.4.5.5.0.-.9.e.0.8.-.b.d.c.8.3.a.c.8.e.1.4.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.6.8.-.0.0.0.1.-.0.0.1.f.-.0.3.b.d.-.d.7.d.5.9.9.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Tue Jun 6 17:10:38 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):41770
              Entropy (8bit):2.196765590310822
              Encrypted:false
              SSDEEP:192:oZ9BrQQANJ4O5SkbHa2tI6EBZjjMw13992uCEO2Fb7HlTa4t:28NN5LbHHtKZjjN13992u9bFXlTNt
              MD5:F208097D8264F3C714F3C9BF6AB884B5
              SHA1:9A3EC7E91D471200F70E2AC2BEBC717C35C13CB2
              SHA-256:3369C2C13AAC80AB85679AB83B0011FA3A1AF42DC4786B44D41F99F741F97D9B
              SHA-512:4F62BF100B395577F2A9E01590EAC85C427FF12BED915C3DBB759FE49085095C9F7AFCFC5F10B20EF1B1D2DEAD9C6D76C4D50B1A865EFA44DBFD7CF1EB125693
              Malicious:false
              Preview:MDMP....... ........h.d.........................................,..........T.......8...........T...........P..............0................................................................................U...........B..............GenuineIntelW...........T.......t....h.d.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Tue Jun 6 17:10:38 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):46538
              Entropy (8bit):2.0113297055222787
              Encrypted:false
              SSDEEP:192:oLFdrQQWYAYvcYO5SkbgNbVV4qjjPQgs+tPQ3OrU9z6gyn:Zxcm5LbgpVVpjjNs+lQ3WUY9
              MD5:A5680F965CDE41493ABA195FA9D696BF
              SHA1:71E3BE0C982EB0A388225AE4BD2485DC2D651583
              SHA-256:BDBEBDFFDE92BF2D8E5CDD1DE499F55B5B4F2B13C196AE26F45ABB273754F9CB
              SHA-512:50D873CCB879F5A2E6F630C9B12A36BE6850C6B1D46C3C9D3D04A4B0DB68501DCE7AA8063193F269D1DE435BFDD9C5EFE9BD437DC7E2DF328C275579053053C0
              Malicious:false
              Preview:MDMP....... ........h.d.........................................,..........T.......8...........T..........................0................................................................................U...........B..............GenuineIntelW...........T............h.d.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8242
              Entropy (8bit):3.689071288684017
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNi3j6X6Ygx6tLTgmfTTSa+prx89bdbsfB/m:RrlsNiz6X6Ym6tLTgmfTTSIdgfE
              MD5:39CB13BCDD7B7D01868D71383CC05EAB
              SHA1:72C699703975D2528B9CFE81507635C6E88A19F6
              SHA-256:A6377B647B4A456F0E829CBF166D339416018CDF7F9D99D6CE4DA0C94DE96C05
              SHA-512:D9A02AFC1AF9A57FB905AF866137EC54DE45017191698937CCCB39014B632EF1C850CB26378B8E25BA8ADAA5DA217FC07CDD646D1967ABE3B3E254F623795C33
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.4.9.2.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8250
              Entropy (8bit):3.6895488765264104
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNiISA6h6Y5p6AgmfTTSa+prl89bdrsfT/m:RrlsNiS6h6Yn6AgmfTTSkdwfC
              MD5:EA0247AEEDEAF6ECCF2D0A6C984FCAE6
              SHA1:CAA6800840ECF711BEADAAB4EE32B9303BEB8581
              SHA-256:D6BDB8FED11F920D65E98D1ACB6D9E4A3ADEC98BE452AE0F06CCB9D085A94945
              SHA-512:50728C8C6589D86C828C360123FDA8F33DB0592EDF69A20C1A2AED8140B48630D46204105C565B269608F7AE582A19FB9A46C97D656AB55864F5C2380BD17B62
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.7.2.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.450142644394944
              Encrypted:false
              SSDEEP:48:cvIwSD8zs0JgtWI9wukcWgc8sqYjJ8fm8M4JCdspFodZ+q8/M1j264SrSnd:uITfyq4grsqYCJ+ZdjnDWnd
              MD5:9CCBECA89DCAFA70D8219FB914E953A8
              SHA1:A2EBB50FB91E556D4CD1AEF457CD4EDD59A7D587
              SHA-256:301BAD03943DB19D200B5A5F1369672B0EFC1698818BE27A4C7E525EAA93EECB
              SHA-512:AE5D12BF2C62F3C58CF79A31692EC096D982B839F5A8C357ABDDB4DE52EB025AC67C20702FA8BA226C1013A5E7F77A78A99D1BF7E58D08361DBD1090C2D309B7
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2073741" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Tue Jun 6 17:10:47 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):36290
              Entropy (8bit):2.324018742283299
              Encrypted:false
              SSDEEP:192:Nqb6sZy56Wh7tYyrOO5SkbxRk+DjjOLRzauVwvOgSLzdL0fgL:AUX5LbxRkcjj6RmuVwv5SL2g
              MD5:EFFC9C6113D077DCE43D2D7A3ABD8A26
              SHA1:52F676B4A9E0C6E64BFE2D04597392B00AAAFA39
              SHA-256:9C58586802A22306096250042F71AA8AA791F8AA2DACC94FC09028EE2CCEF6DE
              SHA-512:8EBD0737DDFB70D64472835DF3934A2448E19C2832DC488CC22862EB933D835FBCA6191685966712F166914892FD6AF40F7911FBC004F5660282470E40F42D52
              Malicious:false
              Preview:MDMP....... ........h.d............d...............l............)..........T.......8...........T................s...........................................................................................U...........B..............GenuineIntelW...........T............h.d.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Tue Jun 6 17:10:48 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):44574
              Entropy (8bit):2.070143589110961
              Encrypted:false
              SSDEEP:192:C8rrQQjUgAYO5SkbPYUXdWjjQCZa8l+sXLZX2/tS:Ct5LbPYUXdWjjFZBl+sXdOtS
              MD5:7D7DCA08FAC54BDE85BFFA371DB5FC64
              SHA1:57B2086BC9DEC1F855194CE1FB841106E33DD7B1
              SHA-256:556E98EA3ACE48CA3CA161F6F8F737FF147BF5A682B37F4C41AB02C87967AE79
              SHA-512:3C62D3600CECEE725F909481670907B96A49467FCCB18B5157EAA390401E1310E837C2DB0AC942A8298F571DF02CE7BEC73D55222B611E2C54B521EBE70DE5F7
              Malicious:false
              Preview:MDMP....... ........h.d.........................................,..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T.......h....h.d.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8254
              Entropy (8bit):3.6898163823017582
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNijy6F6Y5DM60gmfTTSa+prU89b90sfK/m:RrlsNi26F6YtM60gmfTTSn9nfb
              MD5:504B06A34F46804027D1BD132B07A4EC
              SHA1:D73CA43F142F2E73A1FD2E2BF7262E0A55D4DC75
              SHA-256:92DA99F250F49B98378E087FD6EA6540CF065AD7A40970452CC4430FCAB51F1E
              SHA-512:4D996D80B92C91B2340A317BBF1A8A4BB3E472EFF32A0C5D56F2F995FE1053E114EDDA15A61620DE6FD41D51C86D0A9EB593E40C7EBF0616E57ED87BC6C2944A
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.3.6.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.451293558840302
              Encrypted:false
              SSDEEP:48:cvIwSD8zs0JgtWI9wukcWgc8sqYjZ8fm8M4JCdspFI+q8/MG4SrSZd:uITfyq4grsqYKJa+DWZd
              MD5:21DDB47A210A79CDEE8855C2F6FF4991
              SHA1:E75443EE0E4F1750CF4317CE4F6522ABCC618400
              SHA-256:630EE2E4E4CC385A352263CE13E80E9F02621231EDA56070CE173DF0391DB689
              SHA-512:45C6E5C9624B76DE281E36E54DAC734AFF3926B5EC3D4914813F80872CC807408A3149FF7FEF78BE15070111CF0666E1DAEACF32AB630DABD4FCCAFE776B11B8
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2073741" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8254
              Entropy (8bit):3.688469718699916
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNij16+6Y5t60gmfTLSa+prr89b6GsfB+m:RrlsNix6+6YD60gmfTLSa6lfh
              MD5:143C4C824150E57FEECDDE4C29F2D321
              SHA1:1253838AFBB26AED7A7A7D692FC37B56D0799A19
              SHA-256:84C0F7D9B1F1BDDE5F83D2A0512CE816473E729F16D472CBE4E36F4CB8B094DD
              SHA-512:26B843B3D91C8B21D58C1FB07BCAAC90C8A53F974F01614DF8646D134D9D1E7152C6F04A20E3AE6CE2875BC6064A7105A81A4D959D9F43E544DFD16094A8D50A
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.4.0.8.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.447608139583077
              Encrypted:false
              SSDEEP:48:cvIwSD8zs0JgtWI9wukcWgc8sqYjj8fm8M4JCdspFpK+q8/M4Z4SrSxd:uITfyq4grsqYkJeoDWxd
              MD5:15A2EE2778C7559C9D7E231F94B3D0C0
              SHA1:4E18CC3992BA91A17ADD5AA8B0799B5DF5585164
              SHA-256:142356C8AE9AD4CBF57BEB7BF860F7CDD3889CA5F477F7B8631C5B6AF066D1B3
              SHA-512:E585C7B397D01C635A0E8354090D6575A261619DDBC06375BD384B0C36964C6662F28F8369C599A6035F27FD3673C1633A71F7CB39459AEEC1398274D782EB75
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2073741" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):1572864
              Entropy (8bit):4.3048603698443975
              Encrypted:false
              SSDEEP:12288:U4Cp+cGPakOGeG96Ac9wVXfdU6Gzx/7tAAfhmzzcV9g/oCiFmy:3Cp+cGPakOvG96WXUc
              MD5:9D1EF3FEDCC0457A7C7F5EDE8E8BFF7A
              SHA1:354279FA7B7D80AEAAF0DECD89DDEEF05D0D52E5
              SHA-256:8E2A66A38681C83144A4D0544D24B3C66179EA872977B7A27147692A69C8F718
              SHA-512:6D6EEA880AEB227F7C3149573381A94C5D931C31BA8352B8010F759DC9BE3BB278E66DE3F5B2257E757A0A1CB87C8BE687E176DDFF3EFB33ADE75BDEF52A3212
              Malicious:false
              Preview:regfQ...Q...p.\..,.................. .... ......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmb.b..................................................................................................................................................................................................................................................................................................................................................k.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):16384
              Entropy (8bit):3.140884659246412
              Encrypted:false
              SSDEEP:384:7Uyso5K5gQaMKgnVVeeDzev1NKZtjHve3:QysuKAg/eeDzeNNYtjP
              MD5:4A07AA080D55B3DDF2A7A02C98833F17
              SHA1:E5AF1930084DDB64B7CD42ED1FB276905C3C112E
              SHA-256:4246ADA0BD80484E57BD0654BB21908ACE79A95DF88C44314D2FA3811CF35002
              SHA-512:5F527497558D758ECBF479A583B7E5F2A1537501D4F4CD347FAF34FC61F06E673E58BBBA16E5775E886365F74A62993927051FC3A285DE35AB5B40D272370A34
              Malicious:false
              Preview:regfP...P...p.\..,.................. .... ......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmb.b..................................................................................................................................................................................................................................................................................................................................................k.HvLE.>......P.... ......g.D...H......K.........................hbin................p.\..,..........nk,..jd.................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ..jd........ ........................... .......Z.......................Root........lf......Root....nk ..jd.................................... ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):8192
              Entropy (8bit):1.8874137924315533
              Encrypted:false
              SSDEEP:48:AHVUr1AF8YdAwmIufagV3SS3eX5/cwlApldplCPjD04zISwM:Ayre23Iu1hC0QALdLq/zIDM
              MD5:3FCE55035F324D981DEBB4B5035B0D9C
              SHA1:4E8D457B4E61E61A9E73C62A6048E1D78AE4193F
              SHA-256:31B33271FC9C59B903DD558AECFE7B759D1EF668E2113A27803FD558A202620D
              SHA-512:4B4496175B568768F29AC99A9696869212BF558FE43B6FECB9046AC95AC332E1B8363BE37126F52DE340743A5CAABD6FB611C8A4B775C22DBB0F0D4CA4771F39
              Malicious:false
              Preview:regf.........jd.................... ...........C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...t.m.p...D.r.h...........D.r.h...............E.r.h...........rmtm.jd............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):8192
              Entropy (8bit):1.9203346439400772
              Encrypted:false
              SSDEEP:48:2HVUr1Aiun8YdAwmIufagV3SS3eX5/cwlApldplCPjD04zISwM:2yreiu83Iu1hC0QALdLq/zIDM
              MD5:1C215E7FF0530FFC7D5F5AFB404CA57A
              SHA1:66A77FF50BC4A7A2C60C9E010511DC15B68B1802
              SHA-256:5CC6208152F4076C10D9F8140FCEF8A8DE7664C94FB8A2950088F2996C18D487
              SHA-512:E34B2E54BDC4ECC2009853BC865A4B2BBB0E940EC61B20E40FE041C7AED5A94E824D946C461F909AD10B5871613C6EE0D48DB08187EB0C95FAE5AAD5530930EB
              Malicious:false
              Preview:regf.........jd.................... ...........C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...t.m.p...D.r.h...........D.r.h...............E.r.h...........rmtm.jd....................................................................................................................................................................................................................................................................................................................................................HvLE......................`n...Wm.............hbin.................jd............nk,..jd....................0...........................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}c.....sk..............(.................................................................................8......................1.?l.cL<.P...b....~z...........8......................1.?l.cL<.P...b....~z.............?...................?...................?........... ... ........... ...
              File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
              Entropy (8bit):6.610461945368989
              TrID:
              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
              • Generic Win/DOS Executable (2004/3) 0.20%
              • DOS Executable Generic (2002/1) 0.20%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:042_qbot.dll
              File size:741925
              MD5:8c18224b2fcb618bb4305a8687b3bb22
              SHA1:c0a9a8cb468d0f9b185fa1112683612c01c60673
              SHA256:d93d05a84c4d9579accd5dc839ee9f8f7e7f54c623e37175a59146664530dc3d
              SHA512:5b97a909cd2bca451bbc75cfb9e16ed7a16ec34a25fa1c41d9fa120819e54d349bace2116e31c91fddc5b683153dba2829830c39e0a3d9677f8efcadee5e04db
              SSDEEP:12288:zDxy+2MIBYYimb3oG11xfTUUk0uU7/GQ4vbnWj68N:Pg+2MIBYkb4G11hTQ05bGM
              TLSH:A4F43B83A6826C92DBE61435CD9ED33667347A5C83F3DBB3F514A9E27D631A33944208
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^.WW.2..C......!.....L..........p........`.....j............>............ .......4........ ......................0..S..
              Icon Hash:7ae282899bbab082
              Entrypoint:0x6ad81470
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x6ad80000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
              DLL Characteristics:
              Time Stamp:0x5757085E [Tue Jun 7 17:46:06 2016 UTC]
              TLS Callbacks:0x6adc4bf0, 0x6adc4ba0
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:1cba0e23b706e0bfbc0a4cb9b6bd80fb
              Signature Valid:
              Signature Issuer:
              Signature Validation Error:
              Error Number:
              Not Before, Not After
                Subject Chain
                  Version:
                  Thumbprint MD5:
                  Thumbprint SHA-1:
                  Thumbprint SHA-256:
                  Serial:
                  Instruction
                  sub esp, 1Ch
                  mov edx, dword ptr [esp+24h]
                  mov dword ptr [6ADF2030h], 00000000h
                  cmp edx, 01h
                  je 00007FA7FCCE683Ch
                  mov ecx, dword ptr [esp+28h]
                  mov eax, dword ptr [esp+20h]
                  call 00007FA7FCCE6632h
                  add esp, 1Ch
                  retn 000Ch
                  lea esi, dword ptr [esi+00000000h]
                  mov dword ptr [esp+0Ch], edx
                  call 00007FA7FCD2A61Ch
                  mov edx, dword ptr [esp+0Ch]
                  jmp 00007FA7FCCE67F9h
                  nop
                  push ebp
                  mov ebp, esp
                  push esi
                  push ebx
                  sub esp, 10h
                  mov ebx, dword ptr [6ADF4124h]
                  mov dword ptr [esp], 6ADC7000h
                  call ebx
                  mov esi, eax
                  sub esp, 04h
                  test esi, esi
                  mov eax, 00000000h
                  je 00007FA7FCCE684Bh
                  mov dword ptr [esp], 6ADC7000h
                  call dword ptr [6ADF4144h]
                  sub esp, 04h
                  mov dword ptr [6ADF201Ch], eax
                  mov dword ptr [esp+04h], 6ADC7013h
                  mov dword ptr [esp], esi
                  call dword ptr [6ADF4128h]
                  sub esp, 08h
                  test eax, eax
                  je 00007FA7FCCE6833h
                  mov dword ptr [esp+04h], 6ADF2004h
                  mov dword ptr [esp], 6ADEC000h
                  call eax
                  mov eax, dword ptr [6ADC6020h]
                  test eax, eax
                  je 00007FA7FCCE685Ah
                  mov dword ptr [esp], 6ADC7029h
                  call ebx
                  mov edx, 00000000h
                  sub esp, 04h
                  test eax, eax
                  je 00007FA7FCCE6838h
                  mov dword ptr [esp+04h], 00DC7037h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x730000xc53.edata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x740000x5a4.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x8df100x1cc8/55
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x1790.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x760000x18.tls
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x741080xcc.idata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x44ad40x44c00False0.4085191761363636data6.536085286601772IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x460000x240x200False0.068359375data0.444378072732298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rdata0x470000x240c40x24200False0.042259137110726645data2.965728380228879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  /40x6c0000x59540x5a00False0.266796875data4.8715558095609435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  .bss0x720000x3e40x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .edata0x730000xc530xe00False0.41322544642857145data4.9102030514161354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  .idata0x740000x5a40x600False0.42578125data4.85888040741761IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .CRT0x750000x2c0x200False0.0546875data0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .tls0x760000x200x200False0.052734375data0.28655982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .reloc0x770000x17900x1800False0.8084309895833334data6.600381492361927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /140x790000x380x200False0.068359375Matlab v4 mat-file (little endian) *, rows 2, columns 2621440.23653878450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /290x7a0000xba40xc00False0.4329427083333333data5.509643399768958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /410x7b0000x870x200False0.2265625data1.630440230936631IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /550x7c0000x24f4d0x25000False0.9180215371621622data7.808486707251028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /670xa10000x380x200False0.1171875data0.6947581054952565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  DLLImport
                  KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, InterlockedCompareExchange, InterlockedExchange, LeaveCriticalSection, LoadLibraryA, QueryPerformanceCounter, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualProtect, VirtualQuery
                  msvcrt.dll__dllonexit, _amsg_exit, _initterm, _iob, _lock, _onexit, _unlock, abort, calloc, exit, ferror, fflush, fprintf, fread, free, fwrite, getenv, malloc, memcpy, memset, sprintf, sscanf, strlen, strncmp, vfprintf
                  NameOrdinalAddress
                  lcopy_block_row10x6adade90
                  lcopy_sample_rows20x6adade30
                  ldiv_round_up30x6adaddf0
                  linit_1pass_quantizer40x6adabf70
                  linit_2pass_quantizer50x6adadc70
                  linit_c_coef_controller60x6ad82a40
                  linit_c_main_controller70x6ad8c450
                  linit_c_master_control80x6ad8f7f0
                  linit_c_prep_controller90x6ad933c0
                  linit_color_converter100x6ad83cf0
                  linit_color_deconverter110x6ad9a0e0
                  linit_compress_master120x6ad8c240
                  linit_d_coef_controller130x6ad97f90
                  linit_d_main_controller140x6ad9d790
                  linit_d_post_controller150x6ada4f10
                  linit_downsampler160x6ad93f00
                  linit_forward_dct170x6ad84840
                  linit_huff_decoder180x6ad9c280
                  linit_huff_encoder190x6ad8c190
                  linit_input_controller200x6ad9d100
                  linit_inverse_dct210x6ad9a8b0
                  linit_marker_reader220x6ad9fd60
                  linit_marker_writer230x6ad8e8a0
                  linit_master_decompress240x6ada0a60
                  linit_memory_mgr250x6adaf3e0
                  linit_merged_upsampler260x6ada3760
                  linit_phuff_decoder270x6ada4af0
                  linit_phuff_encoder280x6ad92de0
                  linit_upsampler290x6ada55e0
                  lpeg_CreateCompress300x6ad815b0
                  lpeg_CreateDecompress310x6ad94f40
                  lpeg_abort320x6ad8fb40
                  lpeg_abort_compress330x6ad81730
                  lpeg_abort_decompress340x6ad95150
                  lpeg_add_quant_table350x6ad8fc20
                  lpeg_alloc_huff_table360x6ad8fbf0
                  lpeg_alloc_quant_table370x6ad8fbc0
                  lpeg_calc_output_dimensions380x6ada0270
                  lpeg_consume_input390x6ad95430
                  lpeg_copy_critical_parameters400x6ad94c60
                  lpeg_crop_scanline1050x6ad95bb0
                  lpeg_default_colorspace410x6ad8fe60
                  lpeg_destroy420x6ad8fb90
                  lpeg_destroy_compress430x6ad81720
                  lpeg_destroy_decompress440x6ad95140
                  lpeg_fdct_float450x6ada5ce0
                  lpeg_fdct_ifast460x6ada5ec0
                  lpeg_fdct_islow470x6ada60e0
                  lpeg_fill_bit_buffer480x6ad9b0a0
                  lpeg_finish_compress490x6ad817f0
                  lpeg_finish_decompress500x6ad95740
                  lpeg_finish_output510x6ad963f0
                  lpeg_free_large520x6adaf570
                  lpeg_free_small530x6adaf550
                  lpeg_gen_optimal_table540x6ad8bcf0
                  lpeg_get_large550x6adaf560
                  lpeg_get_small560x6adaf540
                  lpeg_has_multiple_scans570x6ad95700
                  lpeg_huff_decode580x6ad9b1e0
                  lpeg_idct_1x1590x6adab430
                  lpeg_idct_2x2600x6adab130
                  lpeg_idct_4x4610x6adaace0
                  lpeg_idct_float620x6ada6380
                  lpeg_idct_ifast630x6ada6880
                  lpeg_idct_islow640x6ada6ea0
                  lpeg_input_complete650x6ad956c0
                  lpeg_make_c_derived_tbl660x6ad8b7a0
                  lpeg_make_d_derived_tbl670x6ad9ac10
                  lpeg_mem_available680x6adaf580
                  lpeg_mem_dest1020x6ad966f0
                  lpeg_mem_init690x6adaf5b0
                  lpeg_mem_src1030x6ad969e0
                  lpeg_mem_term700x6adaf5c0
                  lpeg_new_colormap710x6ada09f0
                  lpeg_open_backing_store720x6adaf590
                  lpeg_quality_scaling730x6ad8fda0
                  lpeg_read_coefficients740x6ada58d0
                  lpeg_read_header750x6ad95160
                  lpeg_read_raw_data760x6ad962c0
                  lpeg_read_scanlines770x6ad95d90
                  lpeg_resync_to_restart780x6ad9fc20
                  lpeg_save_markers790x6ad9fed0
                  lpeg_set_colorspace800x6ad90910
                  lpeg_set_defaults810x6ad902a0
                  lpeg_set_linear_quality820x6ad8fd40
                  lpeg_set_marker_processor830x6ad9ffb0
                  lpeg_set_quality840x6ad8fdd0
                  lpeg_simple_progression850x6ad90d50
                  lpeg_skip_scanlines1040x6ad95e30
                  lpeg_start_compress860x6ad81a50
                  lpeg_start_decompress870x6ad95ad0
                  lpeg_start_output880x6ad96380
                  lpeg_std_error890x6ada5c70
                  lpeg_stdio_dest900x6ad96680
                  lpeg_stdio_src910x6ad96930
                  lpeg_suppress_tables920x6ad81740
                  lpeg_write_coefficients930x6ad94ae0
                  lpeg_write_m_byte940x6ad819e0
                  lpeg_write_m_header950x6ad81980
                  lpeg_write_marker960x6ad818f0
                  lpeg_write_raw_data970x6ad81bb0
                  lpeg_write_scanlines980x6ad81ae0
                  lpeg_write_tables990x6adadeb0
                  lround_up1000x6adade10
                  next1010x6ad819f0
                  No network behavior found

                  Click to jump to process

                  Target ID:0
                  Start time:19:10:36
                  Start date:06/06/2023
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\042_qbot.dll"
                  Imagebase:0xbb0000
                  File size:126464 bytes
                  MD5 hash:3B4636AE519868037940CA5C4272091B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  Target ID:1
                  Start time:19:10:37
                  Start date:06/06/2023
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7c72c0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:19:10:37
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
                  Imagebase:0xd90000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:3
                  Start time:19:10:37
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_block_row
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:4
                  Start time:19:10:37
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",#1
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:8
                  Start time:19:10:37
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 652
                  Imagebase:0xe0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:9
                  Start time:19:10:37
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5492 -s 660
                  Imagebase:0xe0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:12
                  Start time:19:10:40
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\042_qbot.dll,lcopy_sample_rows
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:13
                  Start time:19:10:43
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\042_qbot.dll,ldiv_round_up
                  Imagebase:0x7ff7c72c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:14
                  Start time:19:10:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_block_row
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:15
                  Start time:19:10:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lcopy_sample_rows
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:16
                  Start time:19:10:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",ldiv_round_up
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:18
                  Start time:19:10:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",next
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000012.00000002.567464865.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000012.00000002.567544507.00000000048E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                  Target ID:19
                  Start time:19:10:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lround_up
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:20
                  Start time:19:10:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\042_qbot.dll",lpeg_write_tables
                  Imagebase:0x13c0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:21
                  Start time:19:10:47
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 652
                  Imagebase:0xe0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:23
                  Start time:19:10:47
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 652
                  Imagebase:0xe0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:24
                  Start time:19:10:50
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\wermgr.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\wermgr.exe
                  Imagebase:0x50000
                  File size:191904 bytes
                  MD5 hash:CCF15E662ED5CE77B5FF1A7AAE305233
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  No disassembly