Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
050_qbot.dll

Overview

General Information

Sample Name:050_qbot.dll
(renamed file extension from dat to dll, renamed because original name is a hash value)
Original Sample Name:050_qbot.dat
Analysis ID:882803
MD5:bc4aed05e70290533ba126546e0989b0
SHA1:c148fe036e3aa6a4dc5ce98b323cd8d76d978ac6
SHA256:5ee244bbdd69f41b1df8e3736e09114603ee7d5e7520cae52424ed18642ca265
Infos:

Detection

Qbot
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Found evasive API chain (date check)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Connects to several IPs in different countries
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7304 cmdline: loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll" MD5: 3B4636AE519868037940CA5C4272091B)
    • conhost.exe (PID: 7312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 7340 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 7360 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 7472 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7360 -s 176 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7348 cmdline: rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 7464 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7576 cmdline: rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7604 cmdline: rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7644 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 7752 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7644 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7652 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7660 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7680 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • wermgr.exe (PID: 7868 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: CCF15E662ED5CE77B5FF1A7AAE305233)
    • rundll32.exe (PID: 7704 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7716 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 7784 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "BB30", "Campaign": "1685686808", "Version": "404.1346", "C2 list": ["86.173.2.12:2222", "92.9.45.20:2222", "100.4.163.158:2222", "213.64.33.92:2222", "75.98.154.19:443", "78.192.109.105:2222", "88.126.94.4:50000", "70.28.50.223:2083", "92.154.17.149:2222", "24.234.220.88:993", "87.252.106.39:995", "174.4.89.3:443", "12.172.173.82:20", "90.29.86.138:2222", "70.160.67.203:443", "223.166.13.95:995", "184.181.75.148:443", "95.45.50.93:2222", "201.143.215.69:443", "64.121.161.102:443", "2.82.8.80:443", "188.28.19.84:443", "81.101.185.146:443", "79.77.142.22:2222", "84.215.202.8:443", "183.87.163.165:443", "74.12.147.139:2078", "74.12.147.139:2222", "74.12.147.139:2222", "74.12.147.139:2083", "70.28.50.223:2078", "94.204.202.106:443", "87.221.153.182:2222", "70.28.50.223:2087", "24.234.220.88:990", "2.49.63.160:2222", "72.205.104.134:443", "199.27.66.213:443", "83.249.198.100:2222", "90.104.151.37:2222", "116.75.63.183:443", "70.28.50.223:2078", "117.195.17.148:993", "77.126.99.230:443", "45.62.70.33:443", "24.234.220.88:465", "203.109.44.236:995", "75.109.111.89:443", "161.142.103.187:995", "77.86.98.236:443", "147.147.30.126:2222", "124.246.122.199:2222", "103.123.223.133:443", "180.151.19.13:2078", "176.142.207.63:443", "12.172.173.82:32101", "103.140.174.20:2222", "70.50.83.216:2222", "12.172.173.82:465", "38.2.18.164:443", "93.187.148.45:995", "70.64.77.115:443", "12.172.173.82:21", "70.49.205.198:2222", "27.0.48.233:443", "12.172.173.82:50001", "83.110.223.61:443", "103.141.50.43:995", "85.101.239.116:443", "103.42.86.42:995", "92.1.170.110:995", "81.229.117.95:2222", "124.122.47.148:443", "103.212.19.254:995", "103.139.242.6:443", "125.99.76.102:443", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "70.28.50.223:32100", "79.168.224.165:2222", "121.121.108.120:995", "69.160.121.6:61201", "200.84.211.255:2222", "201.244.108.183:995", "93.187.148.45:443", "85.61.165.153:2222", "184.182.66.109:443", "175.156.217.7:2222", "70.28.50.223:3389", "114.143.176.236:443", "65.95.141.84:2222", "80.6.50.34:443", "12.172.173.82:2087", "47.199.241.39:443", "66.241.183.99:443", "113.11.92.30:443", "186.75.95.6:443", "125.99.69.178:443", "109.130.247.84:2222", "96.56.197.26:2222", "70.50.1.252:2222", "91.160.70.68:32100", "67.70.120.249:2222", "209.171.160.69:995", "98.163.227.79:443", "176.133.4.230:995", "24.234.220.88:995", "45.62.75.250:443", "200.44.198.47:2222", "173.17.45.60:443", "5.192.141.228:2222", "184.63.133.131:995", "70.28.50.223:2083", "78.82.143.154:2222", "73.88.173.113:443", "181.4.225.225:443", "24.234.220.88:443", "174.58.146.57:443"]}
SourceRuleDescriptionAuthorStrings
00000010.00000002.404593397.000000000294A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000010.00000002.405110425.00000000046D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        16.2.rundll32.exe.2960978.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xe055:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0x9c7b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        16.2.rundll32.exe.2960978.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          16.2.rundll32.exe.10000000.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          16.2.rundll32.exe.10000000.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            16.2.rundll32.exe.2960978.0.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000010.00000002.404593397.000000000294A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685686808", "Version": "404.1346", "C2 list": ["86.173.2.12:2222", "92.9.45.20:2222", "100.4.163.158:2222", "213.64.33.92:2222", "75.98.154.19:443", "78.192.109.105:2222", "88.126.94.4:50000", "70.28.50.223:2083", "92.154.17.149:2222", "24.234.220.88:993", "87.252.106.39:995", "174.4.89.3:443", "12.172.173.82:20", "90.29.86.138:2222", "70.160.67.203:443", "223.166.13.95:995", "184.181.75.148:443", "95.45.50.93:2222", "201.143.215.69:443", "64.121.161.102:443", "2.82.8.80:443", "188.28.19.84:443", "81.101.185.146:443", "79.77.142.22:2222", "84.215.202.8:443", "183.87.163.165:443", "74.12.147.139:2078", "74.12.147.139:2222", "74.12.147.139:2222", "74.12.147.139:2083", "70.28.50.223:2078", "94.204.202.106:443", "87.221.153.182:2222", "70.28.50.223:2087", "24.234.220.88:990", "2.49.63.160:2222", "72.205.104.134:443", "199.27.66.213:443", "83.249.198.100:2222", "90.104.151.37:2222", "116.75.63.183:443", "70.28.50.223:2078", "117.195.17.148:993", "77.126.99.230:443", "45.62.70.33:443", "24.234.220.88:465", "203.109.44.236:995", "75.109.111.89:443", "161.142.103.187:995", "77.86.98.236:443", "147.147.30.126:2222", "124.246.122.199:2222", "103.123.223.133:443", "180.151.19.13:2078", "176.142.207.63:443", "12.172.173.82:32101", "103.140.174.20:2222", "70.50.83.216:2222", "12.172.173.82:465", "38.2.18.164:443", "93.187.148.45:995", "70.64.77.115:443", "12.172.173.82:21", "70.49.205.198:2222", "27.0.48.233:443", "12.172.173.82:50001", "83.110.223.61:443", "103.141.50.43:995", "85.101.239.116:443", "103.42.86.42:995", "92.1.170.110:995", "81.229.117.95:2222", "124.122.47.148:443", "103.212.19.254:995", "103.139.242.6:443", "125.99.76.102:443", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "70.28.50.223:32100", "79.168.224.165:2222", "121.121.108.120:995", "69.160.121.6:61201", "200.84.211.255:2222", "201.244.108.183:995", "93.187.148.45:443", "85.61.165.153:2222", "184.182.66.109:443", "175.156.217.7:2222", "70.28.50.223:3389", "114.143.176.236:443", "65.95.141.84:2222", "80.6.50.34:443", "12.172.173.82:2087", "47.199.241.39:443", "66.241.183.99:443", "113.11.92.30:443", "186.75.95.6:443", "125.99.69.178:443", "109.130.247.84:2222", "96.56.197.26:2222", "70.50.1.252:2222", "91.160.70.68:32100", "67.70.120.249:2222", "209.171.160.69:995", "98.163.227.79:443", "176.133.4.230:995", "24.234.220.88:995", "45.62.75.250:443", "200.44.198.47:2222", "173.17.45.60:443", "5.192.141.228:2222", "184.63.133.131:995", "70.28.50.223:2083", "78.82.143.154:2222", "73.88.173.113:443", "181.4.225.225:443", "24.234.220.88:443", "174.58.146.57:443"]}
            Source: 050_qbot.dllReversingLabs: Detection: 45%
            Source: 050_qbot.dllVirustotal: Detection: 57%Perma Link
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: netstat -nao
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: runas
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ipconfig /all
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: net localgroup
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Microsoft
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELF_TEST_1
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: p%08x
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Self test FAILED!!!
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Self test OK.
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: /t5
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: whoami /all
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: cmd
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: route print
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .lnk
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: arp -a
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: net share
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: cmd.exe /c set
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Self check
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %u;%u;%u;
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ProfileImagePath
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ProgramData
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Self check ok!
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: powershell.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: qwinsta
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: net view
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Component_08
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Start screenshot
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: appidapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: c:\ProgramData
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Component_07
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: powershell.exe -encodedCommand
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: netstat -nao
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: runas
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ipconfig /all
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SystemRoot
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: cscript.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: C:\INTERNAL\__empty
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_PhysicalMemory
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ALLUSERSPROFILE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: image/jpeg
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: LocalLow
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: displayName
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: shlwapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CommandLine
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: kernel32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SubmitSamplesConsent
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: 1234567890
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wbj.go
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_DiskDrive
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: System32
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Name
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: WRSA.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: c:\\
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SpyNetReporting
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: FALSE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aswhookx.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Packages
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: application/x-shockwave-flash
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: RepUx.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Winsta0
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: avp.exe;kavtray.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: root\SecurityCenter2
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: MsMpEng.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: userenv.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: csc_ui.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: \\.\pipe\
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: pstorec.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: NTUSER.DAT
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: from
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: netapi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: gdi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: setupapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: iphlpapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CrAmTray.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_ComputerSystem
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: user32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: \sf2.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: egui.exe;ekrn.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Software\Microsoft
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %S.%06d
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: bcrypt.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wtsapi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: shell32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: TRUE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_Bios
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: c:\hiberfil.sysss
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: */*
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ByteFence.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: type=0x%04X
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: snxhk_border_mywnd
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ROOT\CIMV2
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: https
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: fshoster32.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: kernelbase.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: regsvr32.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %s\system32\
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_Process
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: rundll32.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: LOCALAPPDATA
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: cmd.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: APPDATA
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: select
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: mcshield.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: advapi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ws2_32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .cfg
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_Product
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: WQL
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wininet.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: LastBootUpTime
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: urlmon.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Create
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_PnPEntity
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Initializing database...
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: winsta0\default
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .dat
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: WBJ_IGNORE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: next
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wpcap.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: image/pjpeg
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: fmon.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: vbs
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aswhooka.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SysWOW64
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: mpr.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: image/gif
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: crypt32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ntdll.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: open
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SystemRoot
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: cscript.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: C:\INTERNAL\__empty
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_PhysicalMemory
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ALLUSERSPROFILE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: image/jpeg
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: LocalLow
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: displayName
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: shlwapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CommandLine
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: kernel32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SubmitSamplesConsent
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: 1234567890
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wbj.go
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_DiskDrive
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: System32
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Name
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: WRSA.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: c:\\
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SpyNetReporting
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: FALSE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aswhookx.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Packages
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: application/x-shockwave-flash
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: RepUx.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Winsta0
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: avp.exe;kavtray.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: root\SecurityCenter2
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: MsMpEng.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: userenv.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: csc_ui.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: \\.\pipe\
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: pstorec.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: NTUSER.DAT
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: from
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: netapi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: gdi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: setupapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: iphlpapi.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CrAmTray.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_ComputerSystem
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: user32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: \sf2.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: egui.exe;ekrn.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Software\Microsoft
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %S.%06d
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: bcrypt.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wtsapi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: shell32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: TRUE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_Bios
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: c:\hiberfil.sysss
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: */*
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ByteFence.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: type=0x%04X
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: snxhk_border_mywnd
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ROOT\CIMV2
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: https
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: fshoster32.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: kernelbase.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: regsvr32.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %s\system32\
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_Process
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: rundll32.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: LOCALAPPDATA
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: cmd.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: APPDATA
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: select
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: mcshield.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: advapi32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ws2_32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .cfg
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_Product
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: WQL
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wininet.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: LastBootUpTime
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: urlmon.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Create
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Win32_PnPEntity
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Initializing database...
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: winsta0\default
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: .dat
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: WBJ_IGNORE
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: next
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: wpcap.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: image/pjpeg
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: fmon.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: vbs
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: aswhooka.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: SysWOW64
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: mpr.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: image/gif
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: crypt32.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: ntdll.dll
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: open
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 16.2.rundll32.exe.2960978.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 050_qbot.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: unknownHTTPS traffic detected: 68.87.41.40:443 -> 192.168.2.3:49720 version: TLS 1.2
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10009E70 FindFirstFileW,FindNextFileW,

            Networking

            barindex
            Source: Malware configuration extractorIPs: 86.173.2.12:2222
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 100.4.163.158:2222
            Source: Malware configuration extractorIPs: 213.64.33.92:2222
            Source: Malware configuration extractorIPs: 75.98.154.19:443
            Source: Malware configuration extractorIPs: 78.192.109.105:2222
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 24.234.220.88:993
            Source: Malware configuration extractorIPs: 87.252.106.39:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 90.29.86.138:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 201.143.215.69:443
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 74.12.147.139:2078
            Source: Malware configuration extractorIPs: 74.12.147.139:2222
            Source: Malware configuration extractorIPs: 74.12.147.139:2222
            Source: Malware configuration extractorIPs: 74.12.147.139:2083
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 94.204.202.106:443
            Source: Malware configuration extractorIPs: 87.221.153.182:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 24.234.220.88:990
            Source: Malware configuration extractorIPs: 2.49.63.160:2222
            Source: Malware configuration extractorIPs: 72.205.104.134:443
            Source: Malware configuration extractorIPs: 199.27.66.213:443
            Source: Malware configuration extractorIPs: 83.249.198.100:2222
            Source: Malware configuration extractorIPs: 90.104.151.37:2222
            Source: Malware configuration extractorIPs: 116.75.63.183:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 117.195.17.148:993
            Source: Malware configuration extractorIPs: 77.126.99.230:443
            Source: Malware configuration extractorIPs: 45.62.70.33:443
            Source: Malware configuration extractorIPs: 24.234.220.88:465
            Source: Malware configuration extractorIPs: 203.109.44.236:995
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 124.246.122.199:2222
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 180.151.19.13:2078
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 70.50.83.216:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 38.2.18.164:443
            Source: Malware configuration extractorIPs: 93.187.148.45:995
            Source: Malware configuration extractorIPs: 70.64.77.115:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 70.49.205.198:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 103.141.50.43:995
            Source: Malware configuration extractorIPs: 85.101.239.116:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 92.1.170.110:995
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 103.212.19.254:995
            Source: Malware configuration extractorIPs: 103.139.242.6:443
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 121.121.108.120:995
            Source: Malware configuration extractorIPs: 69.160.121.6:61201
            Source: Malware configuration extractorIPs: 200.84.211.255:2222
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 93.187.148.45:443
            Source: Malware configuration extractorIPs: 85.61.165.153:2222
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 175.156.217.7:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 47.199.241.39:443
            Source: Malware configuration extractorIPs: 66.241.183.99:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 125.99.69.178:443
            Source: Malware configuration extractorIPs: 109.130.247.84:2222
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 70.50.1.252:2222
            Source: Malware configuration extractorIPs: 91.160.70.68:32100
            Source: Malware configuration extractorIPs: 67.70.120.249:2222
            Source: Malware configuration extractorIPs: 209.171.160.69:995
            Source: Malware configuration extractorIPs: 98.163.227.79:443
            Source: Malware configuration extractorIPs: 176.133.4.230:995
            Source: Malware configuration extractorIPs: 24.234.220.88:995
            Source: Malware configuration extractorIPs: 45.62.75.250:443
            Source: Malware configuration extractorIPs: 200.44.198.47:2222
            Source: Malware configuration extractorIPs: 173.17.45.60:443
            Source: Malware configuration extractorIPs: 5.192.141.228:2222
            Source: Malware configuration extractorIPs: 184.63.133.131:995
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 78.82.143.154:2222
            Source: Malware configuration extractorIPs: 73.88.173.113:443
            Source: Malware configuration extractorIPs: 181.4.225.225:443
            Source: Malware configuration extractorIPs: 24.234.220.88:443
            Source: Malware configuration extractorIPs: 174.58.146.57:443
            Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cacheCookie: xpgn=1
            Source: unknownNetwork traffic detected: IP country count 27
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownTCP traffic detected without corresponding DNS query: 85.101.239.116
            Source: unknownTCP traffic detected without corresponding DNS query: 85.101.239.116
            Source: unknownTCP traffic detected without corresponding DNS query: 85.101.239.116
            Source: national[1].htm.22.drString found in binary or memory: Find tutorials and demos\u003C\u002Fa\u003E\u003C\u002Fli\u003E\u003Cli\u003E\u003Ca rel=\"nofollow\" href=\"https:\u002F\u002Fwww.facebook.com\u002Fxfinity\"\u003EFacebook equals www.facebook.com (Facebook)
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0C
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0H
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0I
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0O
            Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
            Source: 050_qbot.dllString found in binary or memory: http://www.digicert.com/CPS0
            Source: 050_qbot.dllString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
            Source: 050_qbot.dllString found in binary or memory: https://www.digicert.com/CPS0
            Source: national[1].htm.22.drString found in binary or memory: https://www.xfinity.com/learn/internet-service/acp
            Source: national[1].htm.22.drString found in binary or memory: https://www.xfinity.com/mobile/policies/broadband-disclosures
            Source: national[1].htm.22.drString found in binary or memory: https://www.xfinity.com/networkmanagement
            Source: unknownDNS traffic detected: queries for: xfinity.com
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */*User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: xfinity.comCache-Control: no-cacheCookie: xpgn=1
            Source: unknownHTTPS traffic detected: 68.87.41.40:443 -> 192.168.2.3:49720 version: TLS 1.2
            Source: loaddll32.exe, 00000000.00000002.394701031.0000000000ECB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: 050_qbot.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: 16.2.rundll32.exe.2960978.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 16.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 16.2.rundll32.exe.2960978.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 652
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\Windows\AppCompat\Programs\Amcache.hve.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADAACE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADA6880
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10018E20
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10003A40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100172EF
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100132F1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10016F30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10014B53
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100144D8 NtProtectVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000A51F NtAllocateVirtualMemory,NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000A93E GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000AA38 GetLastError,NtResumeThread,FindCloseChangeNotification,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000CAF3 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: fwpuclnt.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: schannel.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: mskeyprotect.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ncrypt.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ntasn1.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\wermgr.exeSection loaded: ncryptsslp.dll
            Source: 050_qbot.dllStatic PE information: Number of sections : 15 > 10
            Source: 050_qbot.dllReversingLabs: Detection: 45%
            Source: 050_qbot.dllVirustotal: Detection: 57%
            Source: 050_qbot.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7360 -s 176
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7644 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\wermgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Rtindcnm
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC44.tmpJump to behavior
            Source: classification engineClassification label: mal96.troj.evad.winDLL@30/21@2/100
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000D2F7 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000C800 CreateToolhelp32Snapshot,Process32First,Process32Next,FindCloseChangeNotification,
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{650076D1-C3AE-46B5-834A-1C657E63570E}
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7360
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{650076D1-C3AE-46B5-834A-1C657E63570E}
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7716
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7644
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7348
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7312:120:WilError_01
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{D340C8CB-9E8A-4470-A2C5-E9870EB18242}
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: 050_qbot.dllStatic PE information: More than 104 > 100 exports found
            Source: 050_qbot.dllStatic PE information: Image base 0x6ad80000 > 0x60000000
            Source: 050_qbot.dllStatic PE information: section name: /4
            Source: 050_qbot.dllStatic PE information: section name: /14
            Source: 050_qbot.dllStatic PE information: section name: /29
            Source: 050_qbot.dllStatic PE information: section name: /41
            Source: 050_qbot.dllStatic PE information: section name: /55
            Source: 050_qbot.dllStatic PE information: section name: /67
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD814B0 GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,
            Source: 050_qbot.dllStatic PE information: real checksum: 0xc341d should be: 0xbfd40

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 7868 base: 1193C50 value: E9 63 D7 40 FF
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 7684Thread sleep count: 203 > 30
            Source: C:\Windows\SysWOW64\wermgr.exe TID: 7892Thread sleep time: -45000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000B967 GetSystemInfo,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10009E70 FindFirstFileW,FindNextFileW,
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
            Source: Amcache.hve.8.drBinary or memory string: VMware
            Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: Amcache.hve.8.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
            Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.8.drBinary or memory string: VMware7,1
            Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.me
            Source: Amcache.hve.8.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
            Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.18227214.B64.2106252220,BiosReleaseDate:06/25/2021,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD814B0 GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD81F50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10001015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100021CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADC5370 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,EnterCriticalSection,TlsGetValue,GetLastError,TlsGetValue,GetLastError,LeaveCriticalSection,

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 5D0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 5A0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 1193C50
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 5A0000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 5D0000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 5A0000 value starts with: 4D5A
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADB3D50 cpuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADC52A0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000BC31 GetCurrentProcessId,GetLastError,GetVersionExA,GetWindowsDirectoryW,
            Source: rundll32.exe, 00000010.00000003.394592037.000000000474F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: rundll32.exe, 00000010.00000003.394592037.000000000474F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
            Source: rundll32.exe, 00000010.00000003.394592037.000000000474F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: Amcache.hve.8.drBinary or memory string: c:\users\user\desktop\procexp.exe
            Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: rundll32.exe, 00000010.00000003.394592037.000000000474F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
            Source: rundll32.exe, 00000010.00000003.394592037.000000000474F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: Amcache.hve.8.drBinary or memory string: procexp.exe
            Source: rundll32.exe, 00000010.00000003.394592037.000000000474F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 16.2.rundll32.exe.2960978.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.2960978.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000010.00000002.404593397.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.405110425.00000000046D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 16.2.rundll32.exe.2960978.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.2960978.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000010.00000002.404593397.000000000294A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.405110425.00000000046D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts3
            Native API
            1
            DLL Side-Loading
            311
            Process Injection
            11
            Masquerading
            1
            Credential API Hooking
            1
            System Time Discovery
            Remote Services1
            Credential API Hooking
            Exfiltration Over Other Network Medium11
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            21
            Virtualization/Sandbox Evasion
            1
            Input Capture
            21
            Security Software Discovery
            Remote Desktop Protocol1
            Input Capture
            Exfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)311
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Archive Collected Data
            Automated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Rundll32
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer113
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync24
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 882803 Sample: 050_qbot.dat Startdate: 06/06/2023 Architecture: WINDOWS Score: 96 34 103.212.19.254 VNET-ASVNETNETWORKSPVTLTDIN India 2->34 36 184.63.133.131 VIASAT-SP-BACKBONEUS United States 2->36 38 95 other IPs or domains 2->38 48 Found malware configuration 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Yara detected Qbot 2->52 54 2 other signatures 2->54 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 cmd.exe 1 9->14         started        16 rundll32.exe 9->16         started        18 8 other processes 9->18 signatures6 56 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->56 58 Writes to foreign memory regions 11->58 60 Allocates memory in foreign processes 11->60 62 Injects a PE file into a foreign processes 11->62 20 wermgr.exe 11->20         started        23 rundll32.exe 14->23         started        25 WerFault.exe 4 9 16->25         started        27 WerFault.exe 2 9 18->27         started        29 WerFault.exe 9 18->29         started        process7 dnsIp8 40 85.101.239.116, 443, 49725 TTNETTR Turkey 20->40 42 xfinity.com 68.87.41.40, 443, 49720, 49722 COMCAST-7922US United States 20->42 44 www.xfinity.com 20->44 31 WerFault.exe 24 10 23->31         started        process9 dnsIp10 46 192.168.2.1 unknown unknown 31->46

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            050_qbot.dll46%ReversingLabsWin32.Trojan.Zusy
            050_qbot.dll57%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            xfinity.com
            68.87.41.40
            truefalse
              high
              www.xfinity.com
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://xfinity.com/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.xfinity.com/mobile/policies/broadband-disclosuresnational[1].htm.22.drfalse
                    high
                    http://upx.sf.netAmcache.hve.8.drfalse
                      high
                      https://www.xfinity.com/learn/internet-service/acpnational[1].htm.22.drfalse
                        high
                        https://www.xfinity.com/networkmanagementnational[1].htm.22.drfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          38.2.18.164
                          unknownUnited States
                          174COGENT-174UStrue
                          2.82.8.80
                          unknownPortugal
                          3243MEO-RESIDENCIALPTtrue
                          70.160.67.203
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          83.110.223.61
                          unknownUnited Arab Emirates
                          5384EMIRATES-INTERNETEmiratesInternetAEtrue
                          209.171.160.69
                          unknownCanada
                          852ASN852CAtrue
                          84.215.202.8
                          unknownNorway
                          41164GET-NOGETNorwayNOtrue
                          184.182.66.109
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          200.84.211.255
                          unknownVenezuela
                          8048CANTVServiciosVenezuelaVEtrue
                          125.99.69.178
                          unknownIndia
                          17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                          174.4.89.3
                          unknownCanada
                          6327SHAWCAtrue
                          121.121.108.120
                          unknownMalaysia
                          9534MAXIS-AS1-APBinariangBerhadMYtrue
                          161.142.103.187
                          unknownMalaysia
                          9930TTNET-MYTIMEdotComBerhadMYtrue
                          213.64.33.92
                          unknownSweden
                          3301TELIANET-SWEDENTeliaCompanySEtrue
                          114.143.176.236
                          unknownIndia
                          17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
                          24.234.220.88
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          67.70.120.249
                          unknownCanada
                          577BACOMCAtrue
                          73.88.173.113
                          unknownUnited States
                          7922COMCAST-7922UStrue
                          72.205.104.134
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          117.195.17.148
                          unknownIndia
                          9829BSNL-NIBNationalInternetBackboneINtrue
                          69.160.121.6
                          unknownJamaica
                          33576DIG001JMtrue
                          176.133.4.230
                          unknownFrance
                          5410BOUYGTEL-ISPFRtrue
                          183.87.163.165
                          unknownIndia
                          132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
                          184.181.75.148
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          70.49.205.198
                          unknownCanada
                          577BACOMCAtrue
                          87.221.153.182
                          unknownSpain
                          12479UNI2-ASEStrue
                          70.50.1.252
                          unknownCanada
                          577BACOMCAtrue
                          85.101.239.116
                          unknownTurkey
                          9121TTNETTRtrue
                          181.4.225.225
                          unknownArgentina
                          7303TelecomArgentinaSAARtrue
                          100.4.163.158
                          unknownUnited States
                          701UUNETUStrue
                          103.141.50.43
                          unknownIndia
                          133693SKISP-AS-INSriKrishnaInternetServicesPrivateLimitedItrue
                          70.50.83.216
                          unknownCanada
                          577BACOMCAtrue
                          92.1.170.110
                          unknownUnited Kingdom
                          13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
                          64.121.161.102
                          unknownUnited States
                          6079RCN-ASUStrue
                          96.56.197.26
                          unknownUnited States
                          6128CABLE-NET-1UStrue
                          188.28.19.84
                          unknownUnited Kingdom
                          206067H3GUKGBtrue
                          125.99.76.102
                          unknownIndia
                          17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                          81.101.185.146
                          unknownUnited Kingdom
                          5089NTLGBtrue
                          116.75.63.183
                          unknownIndia
                          17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
                          68.87.41.40
                          xfinity.comUnited States
                          7922COMCAST-7922USfalse
                          124.246.122.199
                          unknownSingapore
                          63850ENTRUSTICT-AS-APQRHUBPTYLTDTAEntrustICTAUtrue
                          147.147.30.126
                          unknownUnited Kingdom
                          6871PLUSNETUKInternetServiceProviderGBtrue
                          109.130.247.84
                          unknownBelgium
                          5432PROXIMUS-ISP-ASBEtrue
                          75.109.111.89
                          unknownUnited States
                          19108SUDDENLINK-COMMUNICATIONSUStrue
                          88.126.94.4
                          unknownFrance
                          12322PROXADFRtrue
                          124.122.47.148
                          unknownThailand
                          17552TRUE-AS-APTrueInternetCoLtdTHtrue
                          66.241.183.99
                          unknownUnited States
                          16604HUNTEL-NETUStrue
                          180.151.19.13
                          unknownIndia
                          10029SHYAMSPECTRA-ASSHYAMSPECTRAPVTLTDINtrue
                          94.204.202.106
                          unknownUnited Arab Emirates
                          15802DU-AS1AEtrue
                          47.205.25.170
                          unknownUnited States
                          5650FRONTIER-FRTRUStrue
                          95.45.50.93
                          unknownIreland
                          5466EIRCOMInternetHouseIEtrue
                          103.212.19.254
                          unknownIndia
                          132956VNET-ASVNETNETWORKSPVTLTDINtrue
                          85.61.165.153
                          unknownSpain
                          12479UNI2-ASEStrue
                          91.160.70.68
                          unknownFrance
                          12322PROXADFRtrue
                          201.143.215.69
                          unknownMexico
                          8151UninetSAdeCVMXtrue
                          184.63.133.131
                          unknownUnited States
                          7155VIASAT-SP-BACKBONEUStrue
                          203.109.44.236
                          unknownIndia
                          135777NECONN-ASShreenortheastConnectAndServicesPvtLtdINtrue
                          90.104.151.37
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          201.244.108.183
                          unknownColombia
                          19429ETB-ColombiaCOtrue
                          2.49.63.160
                          unknownUnited Arab Emirates
                          5384EMIRATES-INTERNETEmiratesInternetAEtrue
                          103.42.86.42
                          unknownIndia
                          133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
                          80.6.50.34
                          unknownUnited Kingdom
                          5089NTLGBtrue
                          175.156.217.7
                          unknownSingapore
                          4773MOBILEONELTD-AS-APMobileOneLtdMobileInternetServicePrtrue
                          103.139.242.6
                          unknownIndia
                          138798MUTINY-AS-INMutinySystemsPrivateLimitedINtrue
                          27.0.48.233
                          unknownIndia
                          132573SAINGN-AS-INSAINGNNetworkServicesINtrue
                          70.28.50.223
                          unknownCanada
                          577BACOMCAtrue
                          173.17.45.60
                          unknownUnited States
                          30036MEDIACOM-ENTERPRISE-BUSINESSUStrue
                          81.229.117.95
                          unknownSweden
                          3301TELIANET-SWEDENTeliaCompanySEtrue
                          70.64.77.115
                          unknownCanada
                          6327SHAWCAtrue
                          87.252.106.39
                          unknownItaly
                          48544TECNOADSL-ASITtrue
                          79.77.142.22
                          unknownUnited Kingdom
                          9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
                          98.163.227.79
                          unknownUnited States
                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                          93.187.148.45
                          unknownUnited Kingdom
                          8680SURE-INTERNATIONAL-LIMITEDGBtrue
                          186.75.95.6
                          unknownPanama
                          11556CableWirelessPanamaPAtrue
                          50.68.186.195
                          unknownCanada
                          6327SHAWCAtrue
                          45.62.70.33
                          unknownCanada
                          40440NRTC-CAtrue
                          83.249.198.100
                          unknownSweden
                          39651COMHEM-SWEDENSEtrue
                          12.172.173.82
                          unknownUnited States
                          2386INS-ASUStrue
                          47.199.241.39
                          unknownUnited States
                          5650FRONTIER-FRTRUStrue
                          79.168.224.165
                          unknownPortugal
                          2860NOS_COMUNICACOESPTtrue
                          199.27.66.213
                          unknownUnited States
                          40608HCTNEBRASKAUStrue
                          200.44.198.47
                          unknownVenezuela
                          8048CANTVServiciosVenezuelaVEtrue
                          176.142.207.63
                          unknownFrance
                          5410BOUYGTEL-ISPFRtrue
                          86.173.2.12
                          unknownUnited Kingdom
                          2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
                          45.62.75.250
                          unknownCanada
                          40440NRTC-CAtrue
                          92.154.17.149
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          90.29.86.138
                          unknownFrance
                          3215FranceTelecom-OrangeFRtrue
                          174.58.146.57
                          unknownUnited States
                          7922COMCAST-7922UStrue
                          223.166.13.95
                          unknownChina
                          17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
                          5.192.141.228
                          unknownUnited Arab Emirates
                          5384EMIRATES-INTERNETEmiratesInternetAEtrue
                          65.95.141.84
                          unknownCanada
                          577BACOMCAtrue
                          75.98.154.19
                          unknownUnited States
                          32444SAFELINK-MVUStrue
                          77.126.99.230
                          unknownIsrael
                          9116GOLDENLINES-ASNPartnerCommunicationsMainAutonomousSystetrue
                          103.123.223.133
                          unknownIndia
                          138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
                          74.12.147.139
                          unknownCanada
                          577BACOMCAtrue
                          92.9.45.20
                          unknownUnited Kingdom
                          13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
                          113.11.92.30
                          unknownBangladesh
                          7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
                          77.86.98.236
                          unknownUnited Kingdom
                          12390KINGSTON-UK-ASGBtrue
                          103.140.174.20
                          unknownIndia
                          138763PRAVEEN1-ASPraveenTelecomPvtLtdINtrue
                          78.192.109.105
                          unknownFrance
                          12322PROXADFRtrue
                          IP
                          192.168.2.1
                          Joe Sandbox Version:37.1.0 Beryl
                          Analysis ID:882803
                          Start date and time:2023-06-06 20:11:32 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 11m 53s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:27
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:050_qbot.dll
                          (renamed file extension from dat to dll, renamed because original name is a hash value)
                          Original Sample Name:050_qbot.dat
                          Detection:MAL
                          Classification:mal96.troj.evad.winDLL@30/21@2/100
                          EGA Information:
                          • Successful, ratio: 50%
                          HDC Information:
                          • Successful, ratio: 27.4% (good quality ratio 26.1%)
                          • Quality average: 78.3%
                          • Quality standard deviation: 25.4%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Override analysis time to 240s for rundll32
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.189.173.22, 13.89.179.12, 52.168.117.173, 104.77.34.176
                          • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, e10994.dscx.akamaiedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, www.xfinity.com.edgekey.net, watson.telemetry.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com
                          • Execution Graph export aborted for target rundll32.exe, PID 7348 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          TimeTypeDescription
                          20:12:41API Interceptor4x Sleep call for process: WerFault.exe modified
                          20:12:42API Interceptor1x Sleep call for process: loaddll32.exe modified
                          20:12:52API Interceptor9x Sleep call for process: wermgr.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9066207430618478
                          Encrypted:false
                          SSDEEP:192:cViyb40oXbHBUZMX4jed+U/u7syS274ItWc:qiyb+X7BUZMX4jeh/u7syX4ItWc
                          MD5:169D511F0C95CDEDB873F20E357E4D18
                          SHA1:F42F40520E11B62749552AF21191B275EF70D272
                          SHA-256:AE324FB16CA220D071E6509A4CAA89656A5B62CB9F7110D839A0856313187E1D
                          SHA-512:6D659A4968D866D59667123628D10C570822CF0DE176E50752FE58080EB0109DBA5638A14F8AD24B5A17291BBF0F129E4AD8AA9A9A9C2E9FB8FED3DAA2981436
                          Malicious:false
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.1.5.4.6.0.6.7.0.6.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.1.5.5.5.1.2.9.5.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.9.2.3.b.0.3.-.2.5.f.e.-.4.f.0.f.-.8.4.9.2.-.7.2.0.c.c.1.a.6.b.5.2.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.e.4.3.7.d.4.4.-.9.3.c.7.-.4.5.e.a.-.b.1.1.c.-.2.5.2.4.7.1.8.f.f.b.7.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.b.4.-.0.0.0.1.-.0.0.1.f.-.6.9.0.5.-.f.9.e.6.e.d.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9063246894729109
                          Encrypted:false
                          SSDEEP:192:22Aci440oXxHBUZMX4jed+U/u7syS274ItWc:BAci4+XBBUZMX4jeh/u7syX4ItWc
                          MD5:E6AA0E9B8403B9BBC44D145D121987A3
                          SHA1:1DD127A3C66AC722BB272B311F6560805AB2AE9F
                          SHA-256:500D7E7A43E8089E04982D8DC37277392F0D6AB06913A284AD3BF7CEC534FA58
                          SHA-512:EACBC653501DD50BA20B462BB761875731060496B1AF3923F456646343CA74E212E53C1278976E54F8D70240BFEB2DA82950D31C249FF7D4F84F74D48EE792C4
                          Malicious:false
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.1.5.4.4.4.3.5.6.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.1.5.5.3.9.6.6.9.4.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.2.c.9.2.4.c.-.a.b.3.3.-.4.9.2.4.-.b.c.6.e.-.c.5.5.d.f.7.8.8.9.8.2.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.2.9.8.8.5.b.f.-.2.8.7.3.-.4.a.6.3.-.b.3.f.f.-.8.3.7.7.c.f.8.f.4.c.0.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.c.0.-.0.0.0.1.-.0.0.1.f.-.c.4.3.e.-.f.e.e.6.e.d.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9060277039144707
                          Encrypted:false
                          SSDEEP:192:7Gic40oXPHBUZMX4jed+U/u7syS274ItWc:yic+XPBUZMX4jeh/u7syX4ItWc
                          MD5:10483F8EA7B33042994DDD51A6168DFA
                          SHA1:F243962BEC8015C7E4B61CF3F0A9ED0A4F7BDAEB
                          SHA-256:EFBBE1CB574E63C46BE9DC5BE369B38D498DAF7C3E2D2433853C8FABC8943276
                          SHA-512:115FE6D4A36C2253C11C0B22CE4045A7DDC16F575479042F0369B76F547C9F9BA433A237A9C7727531BFF266D896AC10C2ED9E8076F9D1596A3FB0397D7D6E5C
                          Malicious:false
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.1.6.3.4.6.1.0.1.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.1.6.4.3.6.7.2.6.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.5.1.9.3.3.a.e.-.2.a.c.d.-.4.a.1.5.-.8.c.f.7.-.4.d.7.b.7.c.f.d.c.b.c.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.3.c.b.6.f.b.9.-.9.9.8.9.-.4.2.4.5.-.a.5.4.7.-.1.1.3.d.0.b.2.4.6.6.d.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.d.c.-.0.0.0.1.-.0.0.1.f.-.8.1.a.7.-.6.a.e.c.e.d.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9063464210323204
                          Encrypted:false
                          SSDEEP:192:9RhniK40oX3HBUZMX4jed+U/u7syS274ItWcM:7hniK+XXBUZMX4jeh/u7syX4ItWc
                          MD5:212AD9C3E724A63688ABD20855A8BE96
                          SHA1:4CAFE7B4041B0E137282E6572D23682B482D9BD3
                          SHA-256:07E0AEBD96798BB9CE4988210C5DBB0E4BBC2E26DD5825BA5ACB0C35B6F18070
                          SHA-512:82FAFFB5316BD203084AE243D994DE31371060319F12348D3296C334C993D1FEFD3EF9FC838A1A832542BDC956ADB6EFF79EB1D9447D21B6EFA8D88CE156C539
                          Malicious:false
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.1.6.3.7.1.6.7.3.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.1.6.4.6.6.9.8.4.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.2.f.8.b.3.c.-.c.9.d.d.-.4.0.6.3.-.a.b.3.7.-.0.6.9.c.c.8.9.8.d.9.4.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.a.e.4.f.f.0.8.-.3.4.5.1.-.4.f.b.c.-.b.c.6.b.-.4.1.7.7.3.b.4.5.a.4.7.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.2.4.-.0.0.0.1.-.0.0.1.f.-.b.2.c.5.-.a.5.e.c.e.d.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8238
                          Entropy (8bit):3.6875671559623218
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNiS567k6Y+TQL6zgmfTLSRCpr789bwosfuMwm:RrlsNis6Y6YXL6zgmfTLSNwbfu6
                          MD5:CEB69329E5DF5148A263C463F8243A6A
                          SHA1:052187542026E6A0A179EC3DF60FF4E4AF940580
                          SHA-256:DEC2380EA8B8E65A7A26C0D6488040E5A9F700EC3F31B54759D33BBCD15C17D0
                          SHA-512:D57841A8D7EA8AC52DB29EB1F8E26F7CA89D6052B4CD286499280596A2A51F529657866D57E0BDF3ABC9ED86B0E84CFB5193783AAE53414B07241AF995258C0A
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.1.6.<./.P.i.d.>.......
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4630
                          Entropy (8bit):4.443916631030679
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zshJgtWI9OM//rWgc8sqYjt8fm8M4JCdspFNY+q8/MMu4SrS0d:uITfzE/agrsqYuJonDW0d
                          MD5:6585F702E3794663FF1A871B349EA7E2
                          SHA1:5325AD1ECF61FC325DD5E9CB9796A7CB4D0B1543
                          SHA-256:3A78ABB2FF5E54B8B9F465CEAAD0A69F1BAD1362C908939EA8CC5F0BB766086A
                          SHA-512:BBDAEED9098A37956A63E9B1622E87A73C6323675D7F3F6BA86EF05A8EEF42DC2C69EB723FFAC174289FE3446F09AE8BA08847EB2845161B34E1FA8677CA4559
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074343" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8238
                          Entropy (8bit):3.6877037749825883
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNis26r6Y+TQ+6zgmfTTSRCprz89bPNsfplm:RrlsNit6r6YX+6zgmfTTSlPGfy
                          MD5:FD051D2F33FCA92E0CF472AB77365483
                          SHA1:4AF645FEEB6AAAD15FE8F7AE69DD3BA5558B1B0E
                          SHA-256:9B53177523219B0DCD5D29303172A897FFDCF834F0377F967804269AF166CC68
                          SHA-512:277DB67280E24F668B72C7D2D804143E3B85DA4777A1D9B060242A31B6CC060FB33A83F6525A0AFB58E7E5AB5EA6980BBAB2F5F56816C52E07FDA6D1195858A6
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.4.4.<./.P.i.d.>.......
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4630
                          Entropy (8bit):4.447214550012027
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zshJgtWI9OM//rWgc8sqYj4sF8fm8M4JCdspFd+q8/M94SrSzd:uITfzE/agrsqY+JXVDWzd
                          MD5:3445EB48C4F8125D68F2614B69A7944D
                          SHA1:67D1EA24FB282B73F04A1ECE4BB716C338DB5E57
                          SHA-256:74F06C7F48F529EF5D4AE1DEE96B55CE79621B12FC9E25206FD6B30D52A15394
                          SHA-512:3B47B87CA076B73644199B536B9BDD75450C6581986DEE40A126BE105B8140B9AC14B0CA9A094D8BEB07F657260587664C9182BBF14971243E3402C2CAC3E650
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074343" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:34 2023, 0x1205a4 type
                          Category:dropped
                          Size (bytes):37022
                          Entropy (8bit):2.3212349811459285
                          Encrypted:false
                          SSDEEP:192:PoPpZ53+c+s3rRO5SkbJSIN0iiuQxlZZNohBnW:YD+F5LbJtViJZYW
                          MD5:7E3CC1E84B9A701683E3F1BA55AC5853
                          SHA1:71D6A87E6E828FD871D8B8FC4CB10B98106CF70B
                          SHA-256:8898678271CCDFD7C50E51C824B10D9CAD5834C18633462FFE79A779B8671727
                          SHA-512:FA9BA32EDB462E8222E1F698FA812310049DBBACC3D9306764EBDF2D01CF8D2503483FE47E907F70B0C1A533B0CAFCC5F7B2B70AC27AC0932D3359EE8BFE2AB5
                          Malicious:false
                          Preview:MDMP....... ..........d............d...............l............)..........T.......8...........T...........P...Nv...........................................................................................U...........B..............GenuineIntelW...........T..............d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:34 2023, 0x1205a4 type
                          Category:dropped
                          Size (bytes):46194
                          Entropy (8bit):2.0466594984783146
                          Encrypted:false
                          SSDEEP:192:P/ShQxZRHO5SkbVx3AiZxBjWbpjQajSw+dSgfxg4zLnC:2k45LbVx3AiZx6jQeJgf7C
                          MD5:6E58F0E10A6E2E38DE00971791FA43F4
                          SHA1:24D9C1900E663D20BB2A064FAD40C145BC7A7D28
                          SHA-256:84549194E014320234440A541916433CB7C153CEA2B657A572A47B39E3552930
                          SHA-512:D997309D49D8C78ACA0E9CF7B87298CB795B68999399DFF91FD24D4D2A0FA042420353DBF13CD9C366214F3384CBBA374BBAFDBB45B137149B5A2699B7BF7C33
                          Malicious:false
                          Preview:MDMP....... ..........d.........................................,..........T.......8...........T...............r...........0................................................................................U...........B..............GenuineIntelW...........T..............d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8244
                          Entropy (8bit):3.6869774540447073
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNiXd6W6YzI6ygmfTTSRCprO89bH/sf2tm:RrlsNiN6W6Yc6ygmfTTSmHkf9
                          MD5:819244432D524A50A4FA7BC4893D29B7
                          SHA1:75B2EA4F29A358FABE833733126D2656216ECDD4
                          SHA-256:D1EB7A88DE74983D27CFC5FB084F1206D1ECD76D35B15BC7D7432D759C500305
                          SHA-512:A5557EE00C34AEE23DE800C16A5119A0436FDABFEB0BDB6126535F59469E4C24B61B4E187FA5160ECB8D85AD55FF0BE5652C60881C7DB8ABF00EDFBC3CB8DE85
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.6.0.<./.P.i.d.>.......
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8248
                          Entropy (8bit):3.686976676287553
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNiNF6nq6Y+rW6z5GgmfTTSRCprG89bH+sfMtm:RrlsNiP6q6Yj6cgmfTTSeH9fb
                          MD5:CE8A351A6CE3B43851D7FEA217A57D38
                          SHA1:41E34625391FFF5506BBE3E23502C9A70CA1B085
                          SHA-256:642F091CB90EB38B282FCFADD84AB10967AF73F781681095A6C99E42ECEE5F58
                          SHA-512:0E64EB19ABA6C8BC698084B00B4B411133810ABF773D60E80A63C259F2D9080E41FAAABEE8E06B20FFB7E525EED2CD3D48F53F468EDE808356AE5A3383399DA6
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.4.8.<./.P.i.d.>.......
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4630
                          Entropy (8bit):4.448850272962248
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zshJgtWI9OM//rWgc8sqYj6M8fm8M4JCdspFq+q8/MF4SrSid:uITfzE/agrsqYOxJINDWid
                          MD5:35567EC53BBAC3112AB454B86C8A582F
                          SHA1:F4A188D50942426AC0F318362FB95376D44E723A
                          SHA-256:2EAFF2AC1939A3272BB868CE6AB03B5CD13EFE21D768DB558F5DE1E2C485A2C2
                          SHA-512:6F6EC3B67D78B7B133D2F1E485D1CB81CDF008C9B7C7A008D67B2711CB7DF3733C0DCB2EF3644801D91694078C4D5C88D37804179DAFAE33956B0495376A66E0
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074343" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4630
                          Entropy (8bit):4.448988703772393
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zshJgtWI9OM//rWgc8sqYj+8fm8M4JCdspFX+q8/M2Bq4SrSvd:uITfzE/agrsqYPJ9WqDWvd
                          MD5:168F8CF55B81AAF58D263CD6CCB0C80C
                          SHA1:C66D925BC1A68B1690D07E1228EB12F4C1AF5FF6
                          SHA-256:0EA68CF4D448C2897C3BF20C0EA96D1C8B755BF149BF25104BA2B08035964423
                          SHA-512:5EF0D0FBCEE48CD72CF49E93C9D211CD13F1408BB10AF1485CA5BDE266D2E9E504AA154425463862759AAABDD183A2F92D47374FFD06B5261A47E58C82ECA4F7
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074343" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:43 2023, 0x1205a4 type
                          Category:dropped
                          Size (bytes):36850
                          Entropy (8bit):2.3283087911714158
                          Encrypted:false
                          SSDEEP:192:uVO/LpZ53+c+/of+rBO5Skb5d3+CM2QoySNOGWsUoIjdfXC6:B/D+Qb5LbD3jMpvsRSXv
                          MD5:42A7F45FCA9E6D29B7C97C9C20BC138E
                          SHA1:99859C3611833794FC5AF570DDE8E535C47258AD
                          SHA-256:E5C4BC65D84F5BED01CE071A89BEF44CA87A84584D494A887B190ACCA8393BDF
                          SHA-512:7422A73EE90766E8A3A221D099033EB87F6927FF7D5EC93BDEB6C5604B34C3835E3910BD61E7C89F2BE1FB326A84602CE29CD014035E567CA9596F9E08FE547E
                          Malicious:false
                          Preview:MDMP....... ..........d............d...............l............)..........T.......8...........T................u...........................................................................................U...........B..............GenuineIntelW...........T..............d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:44 2023, 0x1205a4 type
                          Category:dropped
                          Size (bytes):37190
                          Entropy (8bit):2.307754369406635
                          Encrypted:false
                          SSDEEP:192:JW7pZ53+c+oSrxO5SkbRS8+5v4tBwFKlfzX:ED+u5LbReF4nwFkz
                          MD5:CF3F19575C5EB2CFB87A95EFE76A2A1F
                          SHA1:645E00E98762578A8C06E52537F46E65C320BAFE
                          SHA-256:D52557364C723FBE9A00BB7E5D173C48E428D9A81C2F5424F44161721CD3D4FD
                          SHA-512:801D01A1A2BAB2C0BEABE908DD708AB76EDB24A3E36170F214578C689064CA2145A34BDCCB96990E0C3929CA20DBD005E3C0C7DA6FEBD28C8402CB27CE531F8B
                          Malicious:false
                          Preview:MDMP....... ..........d............d...............l............)..........T.......8...........T...............Fw...........................................................................................U...........B..............GenuineIntelW...........T.......$......d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\wermgr.exe
                          File Type:HTML document, ASCII text, with very long lines (65212)
                          Category:dropped
                          Size (bytes):149673
                          Entropy (8bit):5.2876644855030595
                          Encrypted:false
                          SSDEEP:3072:/DbDv9PpwZW+V6ssCcVwjhrTFJnZV12K5AZvBYEKdBW:zIAuW
                          MD5:7EBE3B8C23361677A5D266FC33AD5CE0
                          SHA1:95575823454420072615E512F96E6AE5061ACA35
                          SHA-256:C7EDD3195D91EF7CD82A3041875BE1D314DFB5E5B58116D9FB8DAEAB3015E929
                          SHA-512:83F660B73447B91B5EC02D0126739B24C831B7BEBF50FEC72AADA185CCC7068E30B1666B7D52CEE81120B75F2ABC9868E2C0470E5D92632F12FDE8981457C5C4
                          Malicious:false
                          Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name="theme-color" content="#000000"><script>if (typeof window !== "undefined" && typeof window.process === "undefined") {. window.process = window.process || { env: {} };. }</script><script type="env-config">{"clientId":"xfinity-learn-ui","sitecoreApiKey":"{1A57AE5E-AF7C-4A9E-803A-C756E3F23267}","sitecoreApiUrl":"https://jss.xfinity.com/","dictionaryKey":"{5FA0A82E-BBDB-4FBD-A3F4-9C5D07AA6E0E}","uniform":false,"oAuth":{"clientId":"shoplearn-web","endpoint":"https://oauth.xfinity.com"},"endpoints":{"ssmEnv":"https://api.sc.xfinity.com","aiQApiUrl":"https://aiq-prod.codebig2.net","errorRedirectUrl":"https://www.xfinity.com/learn/landing/sorry","cspApiUrl":"https://csp-prod.codebig2.net","dataLayerTimelineApiUrl":"https://bdl43tfhab.execute-api.us-east-1.amazonaws.com/prod/aiq-banner"},"environment":{"name":"PROD"},"appName":"xfinity-lea
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1572864
                          Entropy (8bit):4.293752371387758
                          Encrypted:false
                          SSDEEP:12288:9lXHZOAS8bjxhOO548jDlElApeyn0mmqmcKMmNgm2gCfRVIIEcIhTjg:vHZOAS8bjxhOO50iE
                          MD5:0546D7FE15434690193A60E8C9064F80
                          SHA1:8B1E91F8AFED3424C5A4F1A2178BD87D7D15772E
                          SHA-256:FF5A19F6AA2812EBEA1461813B0E4FECBC34F4124C8B7D25BE4D93676AF17383
                          SHA-512:A64C63E42D8CC2D0ED31580E12592D28F7D34AC7284D2C5226EABE8710D3A475211A6DB10163DE9A69BCCE2EF8E1AAE9FB1A9287A6D937DAD52F09312A1E1BFC
                          Malicious:false
                          Preview:regfj...j...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmr.X................................................................................................................................................................................................................................................................................................................................................."Q.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):16384
                          Entropy (8bit):3.824863906633808
                          Encrypted:false
                          SSDEEP:384:Mkc5Rftx1FPJ4JiwHFnql9OMIRCMYVCln:HqRftx1VJ4JDHF+9OqMY2
                          MD5:A409660149639FF7B7F065C5EA43E064
                          SHA1:C241B9809EB6AC76F209E41ED71CCF1CD6CB756A
                          SHA-256:E97D3E316CDCE621AF4E1359B4A33510CC2F54082399E29ECD0CB058DE8C9C59
                          SHA-512:92212D42E417D4C375226869A4D70CC6264709DFEE6E4ECB72443BE0835EA3184DACE4658261713195C36D0E2BF1E11140843B7AF107C6118083606E8BD14986
                          Malicious:false
                          Preview:regfi...i...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmr.X................................................................................................................................................................................................................................................................................................................................................."Q.HvLE.>......i.............J{...'x,.2.}...........0..............hbin................p.\..,..........nk,..;[........h........................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ..;[........ ........................... .......Z.......................Root........lf......Root....nk ..;[.....................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):8192
                          Entropy (8bit):1.8832207516435515
                          Encrypted:false
                          SSDEEP:48:5HVbvpYdASmiu3SS3eX5/cwlApldplCPjD04zISwL:5xpVNC0QALdLq/zIDL
                          MD5:5721A16B45954133335079E5FDA2A067
                          SHA1:D321C30477F5D115B4C7819C923A44AD1565D52F
                          SHA-256:5CE0F10BF97388180A6DDB6B0FDAA24C9100D3E1616F9467E6982F97490FCA9B
                          SHA-512:D507719E453DAFE6F51F1ED9736EA7CB4E866740B937DDAC53A52C1CDD36BAF73D70F7E9C6FFCC14C8344E3522648BAA9FCB3EBEA74082AA9A323CEE24250512
                          Malicious:false
                          Preview:regf........r.X.................... ...........C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...t.m.p.................-.............-...................-.rmtmr.X................................................................................................................................................................................................................................................................................................................................................1..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):8192
                          Entropy (8bit):1.918183874128478
                          Encrypted:false
                          SSDEEP:48:vHVbvLCGcpYdASmiu3SS3eX5/cwlApldplCPjD04zISwL:vVdcpVNC0QALdLq/zIDL
                          MD5:D1595D3BB01C31B4361E86D8A2AD27B7
                          SHA1:2F87B70952D5E37A59CCD52F5EF16A0746808813
                          SHA-256:8041F9C599169ABD61C83DDD03FA9012A9AD56BC36CD8464321017012EF97439
                          SHA-512:B113C9C6FD5F29096AF5D93383685DFF8FA90504BE45273D5AD0CDAC78A3A698A09023D0120A73FDA1CE3C7B94D32191460A8B5A67E14C713C1F95BD7EFD6822
                          Malicious:false
                          Preview:regf........r.X.................... ...........C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...t.m.p.................-.............-...................-.rmtmr.X................................................................................................................................................................................................................................................................................................................................................7..HvLE....................Q.......s..9..x........hbin................r.X............nk,.r.X........h...........0...........................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}......sk..............(.................................................................................8......................1.?l.cL<.P...b....~z...........8......................1.?l.cL<.P...b....~z.............?...................?...................?........... ... ........... ...
                          File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                          Entropy (8bit):6.606178271521399
                          TrID:
                          • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                          • Generic Win/DOS Executable (2004/3) 0.20%
                          • DOS Executable Generic (2002/1) 0.20%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:050_qbot.dll
                          File size:742838
                          MD5:bc4aed05e70290533ba126546e0989b0
                          SHA1:c148fe036e3aa6a4dc5ce98b323cd8d76d978ac6
                          SHA256:5ee244bbdd69f41b1df8e3736e09114603ee7d5e7520cae52424ed18642ca265
                          SHA512:666c4642a277f7456de0e04432c693bdf65db5182bdcf91e56643b900b24ec2c6e71f66bdb02a69e8e7b530200890955c7cd4556ba257968a6c88c239f4b4735
                          SSDEEP:12288:zDxy+2MIBYYimb3oG11xfTUUk0uU7/GQ4vbnWj68N:Pg+2MIBYkb4G11hTQ05bGM
                          TLSH:A4F43B83A6826C92DBE61435CD9ED33667347A5C83F3DBB3F514A9E27D631A33944208
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^.WW.2..C......!.....L..........p........`.....j............>............ .......4........ ......................0..S..
                          Icon Hash:7ae282899bbab082
                          Entrypoint:0x6ad81470
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x6ad80000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
                          DLL Characteristics:
                          Time Stamp:0x5757085E [Tue Jun 7 17:46:06 2016 UTC]
                          TLS Callbacks:0x6adc4bf0, 0x6adc4ba0
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:1cba0e23b706e0bfbc0a4cb9b6bd80fb
                          Signature Valid:
                          Signature Issuer:
                          Signature Validation Error:
                          Error Number:
                          Not Before, Not After
                            Subject Chain
                              Version:
                              Thumbprint MD5:
                              Thumbprint SHA-1:
                              Thumbprint SHA-256:
                              Serial:
                              Instruction
                              sub esp, 1Ch
                              mov edx, dword ptr [esp+24h]
                              mov dword ptr [6ADF2030h], 00000000h
                              cmp edx, 01h
                              je 00007FA414C7A55Ch
                              mov ecx, dword ptr [esp+28h]
                              mov eax, dword ptr [esp+20h]
                              call 00007FA414C7A352h
                              add esp, 1Ch
                              retn 000Ch
                              lea esi, dword ptr [esi+00000000h]
                              mov dword ptr [esp+0Ch], edx
                              call 00007FA414CBE33Ch
                              mov edx, dword ptr [esp+0Ch]
                              jmp 00007FA414C7A519h
                              nop
                              push ebp
                              mov ebp, esp
                              push esi
                              push ebx
                              sub esp, 10h
                              mov ebx, dword ptr [6ADF4124h]
                              mov dword ptr [esp], 6ADC7000h
                              call ebx
                              mov esi, eax
                              sub esp, 04h
                              test esi, esi
                              mov eax, 00000000h
                              je 00007FA414C7A56Bh
                              mov dword ptr [esp], 6ADC7000h
                              call dword ptr [6ADF4144h]
                              sub esp, 04h
                              mov dword ptr [6ADF201Ch], eax
                              mov dword ptr [esp+04h], 6ADC7013h
                              mov dword ptr [esp], esi
                              call dword ptr [6ADF4128h]
                              sub esp, 08h
                              test eax, eax
                              je 00007FA414C7A553h
                              mov dword ptr [esp+04h], 6ADF2004h
                              mov dword ptr [esp], 6ADEC000h
                              call eax
                              mov eax, dword ptr [6ADC6020h]
                              test eax, eax
                              je 00007FA414C7A57Ah
                              mov dword ptr [esp], 6ADC7029h
                              call ebx
                              mov edx, 00000000h
                              sub esp, 04h
                              test eax, eax
                              je 00007FA414C7A558h
                              mov dword ptr [esp+04h], 00DC7037h
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x730000xc53.edata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x740000x5a4.idata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x8df100x1cc8/55
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x1790.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x760000x18.tls
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x741080xcc.idata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x44ad40x44c00False0.4085191761363636data6.536085286601772IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .data0x460000x240x200False0.068359375data0.444378072732298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rdata0x470000x240c40x24200False0.042259137110726645data2.965728380228879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                              /40x6c0000x59540x5a00False0.266796875data4.8715558095609435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                              .bss0x720000x3e40x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .edata0x730000xc530xe00False0.41322544642857145data4.9102030514161354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                              .idata0x740000x5a40x600False0.42578125data4.85888040741761IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .CRT0x750000x2c0x200False0.0546875data0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .tls0x760000x200x200False0.052734375data0.28655982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .reloc0x770000x17900x1800False0.8084309895833334data6.600381492361927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              /140x790000x380x200False0.068359375Matlab v4 mat-file (little endian) *, rows 2, columns 2621440.23653878450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              /290x7a0000xba40xc00False0.4329427083333333data5.509643399768958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              /410x7b0000x870x200False0.2265625data1.630440230936631IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              /550x7c0000x24f4d0x25000False0.9180215371621622data7.808486707251028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              /670xa10000x380x200False0.1171875data0.6947581054952565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              DLLImport
                              KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, InterlockedCompareExchange, InterlockedExchange, LeaveCriticalSection, LoadLibraryA, QueryPerformanceCounter, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualProtect, VirtualQuery
                              msvcrt.dll__dllonexit, _amsg_exit, _initterm, _iob, _lock, _onexit, _unlock, abort, calloc, exit, ferror, fflush, fprintf, fread, free, fwrite, getenv, malloc, memcpy, memset, sprintf, sscanf, strlen, strncmp, vfprintf
                              NameOrdinalAddress
                              lcopy_block_row10x6adade90
                              lcopy_sample_rows20x6adade30
                              ldiv_round_up30x6adaddf0
                              linit_1pass_quantizer40x6adabf70
                              linit_2pass_quantizer50x6adadc70
                              linit_c_coef_controller60x6ad82a40
                              linit_c_main_controller70x6ad8c450
                              linit_c_master_control80x6ad8f7f0
                              linit_c_prep_controller90x6ad933c0
                              linit_color_converter100x6ad83cf0
                              linit_color_deconverter110x6ad9a0e0
                              linit_compress_master120x6ad8c240
                              linit_d_coef_controller130x6ad97f90
                              linit_d_main_controller140x6ad9d790
                              linit_d_post_controller150x6ada4f10
                              linit_downsampler160x6ad93f00
                              linit_forward_dct170x6ad84840
                              linit_huff_decoder180x6ad9c280
                              linit_huff_encoder190x6ad8c190
                              linit_input_controller200x6ad9d100
                              linit_inverse_dct210x6ad9a8b0
                              linit_marker_reader220x6ad9fd60
                              linit_marker_writer230x6ad8e8a0
                              linit_master_decompress240x6ada0a60
                              linit_memory_mgr250x6adaf3e0
                              linit_merged_upsampler260x6ada3760
                              linit_phuff_decoder270x6ada4af0
                              linit_phuff_encoder280x6ad92de0
                              linit_upsampler290x6ada55e0
                              lpeg_CreateCompress300x6ad815b0
                              lpeg_CreateDecompress310x6ad94f40
                              lpeg_abort320x6ad8fb40
                              lpeg_abort_compress330x6ad81730
                              lpeg_abort_decompress340x6ad95150
                              lpeg_add_quant_table350x6ad8fc20
                              lpeg_alloc_huff_table360x6ad8fbf0
                              lpeg_alloc_quant_table370x6ad8fbc0
                              lpeg_calc_output_dimensions380x6ada0270
                              lpeg_consume_input390x6ad95430
                              lpeg_copy_critical_parameters400x6ad94c60
                              lpeg_crop_scanline1050x6ad95bb0
                              lpeg_default_colorspace410x6ad8fe60
                              lpeg_destroy420x6ad8fb90
                              lpeg_destroy_compress430x6ad81720
                              lpeg_destroy_decompress440x6ad95140
                              lpeg_fdct_float450x6ada5ce0
                              lpeg_fdct_ifast460x6ada5ec0
                              lpeg_fdct_islow470x6ada60e0
                              lpeg_fill_bit_buffer480x6ad9b0a0
                              lpeg_finish_compress490x6ad817f0
                              lpeg_finish_decompress500x6ad95740
                              lpeg_finish_output510x6ad963f0
                              lpeg_free_large520x6adaf570
                              lpeg_free_small530x6adaf550
                              lpeg_gen_optimal_table540x6ad8bcf0
                              lpeg_get_large550x6adaf560
                              lpeg_get_small560x6adaf540
                              lpeg_has_multiple_scans570x6ad95700
                              lpeg_huff_decode580x6ad9b1e0
                              lpeg_idct_1x1590x6adab430
                              lpeg_idct_2x2600x6adab130
                              lpeg_idct_4x4610x6adaace0
                              lpeg_idct_float620x6ada6380
                              lpeg_idct_ifast630x6ada6880
                              lpeg_idct_islow640x6ada6ea0
                              lpeg_input_complete650x6ad956c0
                              lpeg_make_c_derived_tbl660x6ad8b7a0
                              lpeg_make_d_derived_tbl670x6ad9ac10
                              lpeg_mem_available680x6adaf580
                              lpeg_mem_dest1020x6ad966f0
                              lpeg_mem_init690x6adaf5b0
                              lpeg_mem_src1030x6ad969e0
                              lpeg_mem_term700x6adaf5c0
                              lpeg_new_colormap710x6ada09f0
                              lpeg_open_backing_store720x6adaf590
                              lpeg_quality_scaling730x6ad8fda0
                              lpeg_read_coefficients740x6ada58d0
                              lpeg_read_header750x6ad95160
                              lpeg_read_raw_data760x6ad962c0
                              lpeg_read_scanlines770x6ad95d90
                              lpeg_resync_to_restart780x6ad9fc20
                              lpeg_save_markers790x6ad9fed0
                              lpeg_set_colorspace800x6ad90910
                              lpeg_set_defaults810x6ad902a0
                              lpeg_set_linear_quality820x6ad8fd40
                              lpeg_set_marker_processor830x6ad9ffb0
                              lpeg_set_quality840x6ad8fdd0
                              lpeg_simple_progression850x6ad90d50
                              lpeg_skip_scanlines1040x6ad95e30
                              lpeg_start_compress860x6ad81a50
                              lpeg_start_decompress870x6ad95ad0
                              lpeg_start_output880x6ad96380
                              lpeg_std_error890x6ada5c70
                              lpeg_stdio_dest900x6ad96680
                              lpeg_stdio_src910x6ad96930
                              lpeg_suppress_tables920x6ad81740
                              lpeg_write_coefficients930x6ad94ae0
                              lpeg_write_m_byte940x6ad819e0
                              lpeg_write_m_header950x6ad81980
                              lpeg_write_marker960x6ad818f0
                              lpeg_write_raw_data970x6ad81bb0
                              lpeg_write_scanlines980x6ad81ae0
                              lpeg_write_tables990x6adadeb0
                              lround_up1000x6adade10
                              next1010x6ad819f0
                              TimestampSource PortDest PortSource IPDest IP
                              Jun 6, 2023 20:15:44.428622007 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:44.428693056 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:44.428812981 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:44.432526112 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:44.432560921 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:44.796180010 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:44.796325922 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:44.969425917 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:44.969487906 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:44.970371962 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:44.970494032 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:44.972126961 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:45.016293049 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:45.078532934 CEST4434972068.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:45.081522942 CEST49720443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.328047991 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.328134060 CEST4434972268.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:47.328308105 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.329001904 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.329044104 CEST4434972268.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:47.824717045 CEST4434972268.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:47.824810028 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.825309992 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.825336933 CEST4434972268.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:47.828093052 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:47.828123093 CEST4434972268.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:47.982481003 CEST4434972268.87.41.40192.168.2.3
                              Jun 6, 2023 20:15:47.982672930 CEST49722443192.168.2.368.87.41.40
                              Jun 6, 2023 20:15:48.252844095 CEST49725443192.168.2.385.101.239.116
                              Jun 6, 2023 20:15:48.252918959 CEST4434972585.101.239.116192.168.2.3
                              Jun 6, 2023 20:15:48.253082037 CEST49725443192.168.2.385.101.239.116
                              Jun 6, 2023 20:15:48.258398056 CEST49725443192.168.2.385.101.239.116
                              Jun 6, 2023 20:15:48.258436918 CEST4434972585.101.239.116192.168.2.3
                              TimestampSource PortDest PortSource IPDest IP
                              Jun 6, 2023 20:15:44.271231890 CEST5113953192.168.2.38.8.8.8
                              Jun 6, 2023 20:15:44.417438984 CEST53511398.8.8.8192.168.2.3
                              Jun 6, 2023 20:15:45.086958885 CEST5295553192.168.2.38.8.8.8
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jun 6, 2023 20:15:44.271231890 CEST192.168.2.38.8.8.80xb0a2Standard query (0)xfinity.comA (IP address)IN (0x0001)false
                              Jun 6, 2023 20:15:45.086958885 CEST192.168.2.38.8.8.80xe54dStandard query (0)www.xfinity.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jun 6, 2023 20:15:44.417438984 CEST8.8.8.8192.168.2.30xb0a2No error (0)xfinity.com68.87.41.40A (IP address)IN (0x0001)false
                              Jun 6, 2023 20:15:44.417438984 CEST8.8.8.8192.168.2.30xb0a2No error (0)xfinity.com96.114.21.40A (IP address)IN (0x0001)false
                              Jun 6, 2023 20:15:44.417438984 CEST8.8.8.8192.168.2.30xb0a2No error (0)xfinity.com96.114.14.140A (IP address)IN (0x0001)false
                              Jun 6, 2023 20:15:45.113743067 CEST8.8.8.8192.168.2.30xe54dNo error (0)www.xfinity.comwww.xfinity.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
                              • xfinity.com

                              Click to jump to process

                              Target ID:0
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll"
                              Imagebase:0x1e0000
                              File size:126464 bytes
                              MD5 hash:3B4636AE519868037940CA5C4272091B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:1
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff745070000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:2
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
                              Imagebase:0xb0000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:3
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:4
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:8
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 652
                              Imagebase:0x830000
                              File size:434592 bytes
                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:9
                              Start time:20:12:33
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7360 -s 176
                              Imagebase:0x830000
                              File size:434592 bytes
                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:10
                              Start time:20:12:36
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:11
                              Start time:20:12:39
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:12
                              Start time:20:12:42
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:13
                              Start time:20:12:42
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:14
                              Start time:20:12:42
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:16
                              Start time:20:12:42
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000010.00000002.404593397.000000000294A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000010.00000002.405110425.00000000046D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                              Target ID:17
                              Start time:20:12:42
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:18
                              Start time:20:12:42
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
                              Imagebase:0xe0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:20
                              Start time:20:12:43
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7644 -s 652
                              Imagebase:0x830000
                              File size:434592 bytes
                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:21
                              Start time:20:12:43
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 652
                              Imagebase:0x830000
                              File size:434592 bytes
                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:22
                              Start time:20:12:47
                              Start date:06/06/2023
                              Path:C:\Windows\SysWOW64\wermgr.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\wermgr.exe
                              Imagebase:0x1180000
                              File size:191904 bytes
                              MD5 hash:CCF15E662ED5CE77B5FF1A7AAE305233
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              No disassembly