Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
050_qbot.dll

Overview

General Information

Sample Name:050_qbot.dll
Original Sample Name:050_qbot.dat
Analysis ID:882803
MD5:bc4aed05e70290533ba126546e0989b0
SHA1:c148fe036e3aa6a4dc5ce98b323cd8d76d978ac6
SHA256:5ee244bbdd69f41b1df8e3736e09114603ee7d5e7520cae52424ed18642ca265
Infos:

Detection

Qbot
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Qbot
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Found evasive API chain (date check)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Connects to several IPs in different countries
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5284 cmdline: loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll" MD5: 3B4636AE519868037940CA5C4272091B)
    • conhost.exe (PID: 5292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6832 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1976 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 5876 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 660 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5700 cmdline: rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 2092 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 656 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6884 cmdline: rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3128 cmdline: rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 1832 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 7216 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7044 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5056 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 504 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • wermgr.exe (PID: 7356 cmdline: C:\Windows\SysWOW64\wermgr.exe MD5: CCF15E662ED5CE77B5FF1A7AAE305233)
    • rundll32.exe (PID: 7172 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7188 cmdline: rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 7248 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 668 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
{"Bot id": "BB30", "Campaign": "1685686808", "Version": "404.1346", "C2 list": ["86.173.2.12:2222", "92.9.45.20:2222", "100.4.163.158:2222", "213.64.33.92:2222", "75.98.154.19:443", "78.192.109.105:2222", "88.126.94.4:50000", "70.28.50.223:2083", "92.154.17.149:2222", "24.234.220.88:993", "87.252.106.39:995", "174.4.89.3:443", "12.172.173.82:20", "90.29.86.138:2222", "70.160.67.203:443", "223.166.13.95:995", "184.181.75.148:443", "95.45.50.93:2222", "201.143.215.69:443", "64.121.161.102:443", "2.82.8.80:443", "188.28.19.84:443", "81.101.185.146:443", "79.77.142.22:2222", "84.215.202.8:443", "183.87.163.165:443", "74.12.147.139:2078", "74.12.147.139:2222", "74.12.147.139:2222", "74.12.147.139:2083", "70.28.50.223:2078", "94.204.202.106:443", "87.221.153.182:2222", "70.28.50.223:2087", "24.234.220.88:990", "2.49.63.160:2222", "72.205.104.134:443", "199.27.66.213:443", "83.249.198.100:2222", "90.104.151.37:2222", "116.75.63.183:443", "70.28.50.223:2078", "117.195.17.148:993", "77.126.99.230:443", "45.62.70.33:443", "24.234.220.88:465", "203.109.44.236:995", "75.109.111.89:443", "161.142.103.187:995", "77.86.98.236:443", "147.147.30.126:2222", "124.246.122.199:2222", "103.123.223.133:443", "180.151.19.13:2078", "176.142.207.63:443", "12.172.173.82:32101", "103.140.174.20:2222", "70.50.83.216:2222", "12.172.173.82:465", "38.2.18.164:443", "93.187.148.45:995", "70.64.77.115:443", "12.172.173.82:21", "70.49.205.198:2222", "27.0.48.233:443", "12.172.173.82:50001", "83.110.223.61:443", "103.141.50.43:995", "85.101.239.116:443", "103.42.86.42:995", "92.1.170.110:995", "81.229.117.95:2222", "124.122.47.148:443", "103.212.19.254:995", "103.139.242.6:443", "125.99.76.102:443", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "70.28.50.223:32100", "79.168.224.165:2222", "121.121.108.120:995", "69.160.121.6:61201", "200.84.211.255:2222", "201.244.108.183:995", "93.187.148.45:443", "85.61.165.153:2222", "184.182.66.109:443", "175.156.217.7:2222", "70.28.50.223:3389", "114.143.176.236:443", "65.95.141.84:2222", "80.6.50.34:443", "12.172.173.82:2087", "47.199.241.39:443", "66.241.183.99:443", "113.11.92.30:443", "186.75.95.6:443", "125.99.69.178:443", "109.130.247.84:2222", "96.56.197.26:2222", "70.50.1.252:2222", "91.160.70.68:32100", "67.70.120.249:2222", "209.171.160.69:995", "98.163.227.79:443", "176.133.4.230:995", "24.234.220.88:995", "45.62.75.250:443", "200.44.198.47:2222", "173.17.45.60:443", "5.192.141.228:2222", "184.63.133.131:995", "70.28.50.223:2083", "78.82.143.154:2222", "73.88.173.113:443", "181.4.225.225:443", "24.234.220.88:443", "174.58.146.57:443"]}
SourceRuleDescriptionAuthorStrings
00000010.00000002.387277732.0000000004FC0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000010.00000002.387218469.00000000034AA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      decrypted.memstrJoeSecurity_QbotYara detected QbotJoe Security
        SourceRuleDescriptionAuthorStrings
        16.2.rundll32.exe.10000000.1.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
        • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
        • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
        16.2.rundll32.exe.10000000.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          16.2.rundll32.exe.34c0930.0.raw.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
          • 0xec55:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
          • 0xa87b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
          16.2.rundll32.exe.34c0930.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            16.2.rundll32.exe.34c0930.0.unpackMAL_QakBot_ConfigExtraction_Feb23QakBot Config Extractionkevoreilly
            • 0xe055:$params: 8B 7D 08 8B F1 57 89 55 FC E8 84 99 FF FF 8D 9E 24 04 00 00 89 03 59 85 C0 75 08 6A FC 58 E9
            • 0x9c7b:$conf: 5F 5E 5B C9 C3 51 6A 00 E8 C1 44 00 00 59 59 85 C0 75 01 C3
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000010.00000002.387218469.00000000034AA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Qbot {"Bot id": "BB30", "Campaign": "1685686808", "Version": "404.1346", "C2 list": ["86.173.2.12:2222", "92.9.45.20:2222", "100.4.163.158:2222", "213.64.33.92:2222", "75.98.154.19:443", "78.192.109.105:2222", "88.126.94.4:50000", "70.28.50.223:2083", "92.154.17.149:2222", "24.234.220.88:993", "87.252.106.39:995", "174.4.89.3:443", "12.172.173.82:20", "90.29.86.138:2222", "70.160.67.203:443", "223.166.13.95:995", "184.181.75.148:443", "95.45.50.93:2222", "201.143.215.69:443", "64.121.161.102:443", "2.82.8.80:443", "188.28.19.84:443", "81.101.185.146:443", "79.77.142.22:2222", "84.215.202.8:443", "183.87.163.165:443", "74.12.147.139:2078", "74.12.147.139:2222", "74.12.147.139:2222", "74.12.147.139:2083", "70.28.50.223:2078", "94.204.202.106:443", "87.221.153.182:2222", "70.28.50.223:2087", "24.234.220.88:990", "2.49.63.160:2222", "72.205.104.134:443", "199.27.66.213:443", "83.249.198.100:2222", "90.104.151.37:2222", "116.75.63.183:443", "70.28.50.223:2078", "117.195.17.148:993", "77.126.99.230:443", "45.62.70.33:443", "24.234.220.88:465", "203.109.44.236:995", "75.109.111.89:443", "161.142.103.187:995", "77.86.98.236:443", "147.147.30.126:2222", "124.246.122.199:2222", "103.123.223.133:443", "180.151.19.13:2078", "176.142.207.63:443", "12.172.173.82:32101", "103.140.174.20:2222", "70.50.83.216:2222", "12.172.173.82:465", "38.2.18.164:443", "93.187.148.45:995", "70.64.77.115:443", "12.172.173.82:21", "70.49.205.198:2222", "27.0.48.233:443", "12.172.173.82:50001", "83.110.223.61:443", "103.141.50.43:995", "85.101.239.116:443", "103.42.86.42:995", "92.1.170.110:995", "81.229.117.95:2222", "124.122.47.148:443", "103.212.19.254:995", "103.139.242.6:443", "125.99.76.102:443", "50.68.186.195:443", "47.205.25.170:443", "12.172.173.82:993", "12.172.173.82:22", "70.28.50.223:32100", "79.168.224.165:2222", "121.121.108.120:995", "69.160.121.6:61201", "200.84.211.255:2222", "201.244.108.183:995", "93.187.148.45:443", "85.61.165.153:2222", "184.182.66.109:443", "175.156.217.7:2222", "70.28.50.223:3389", "114.143.176.236:443", "65.95.141.84:2222", "80.6.50.34:443", "12.172.173.82:2087", "47.199.241.39:443", "66.241.183.99:443", "113.11.92.30:443", "186.75.95.6:443", "125.99.69.178:443", "109.130.247.84:2222", "96.56.197.26:2222", "70.50.1.252:2222", "91.160.70.68:32100", "67.70.120.249:2222", "209.171.160.69:995", "98.163.227.79:443", "176.133.4.230:995", "24.234.220.88:995", "45.62.75.250:443", "200.44.198.47:2222", "173.17.45.60:443", "5.192.141.228:2222", "184.63.133.131:995", "70.28.50.223:2083", "78.82.143.154:2222", "73.88.173.113:443", "181.4.225.225:443", "24.234.220.88:443", "174.58.146.57:443"]}
            Source: 050_qbot.dllReversingLabs: Detection: 45%
            Source: 050_qbot.dllVirustotal: Detection: 57%Perma Link
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: netstat -nao
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: runas
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ipconfig /all
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: net localgroup
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: nltest /domain_trusts /all_trusts
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %s %04x.%u %04x.%u res: %s seh_test: %u consts_test: %d vmdetected: %d createprocess: %d
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Microsoft
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELF_TEST_1
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: p%08x
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Self test FAILED!!!
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Self test OK.
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: /t5
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: whoami /all
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: cmd
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: microsoft.com,google.com,cisco.com,oracle.com,verisign.com,broadcom.com,yahoo.com,xfinity.com,irs.gov,linkedin.com
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: ERROR_INSUFFICIENT_BUFFER
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: route print
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .lnk
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: "%s\system32\schtasks.exe" /Create /ST %02u:%02u /RU "NT AUTHORITY\SYSTEM" /SC ONCE /tr "%s" /Z /ET %02u:%02u /tn %s
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: arp -a
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %s "$%s = \"%s\"; & $%s"
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: net share
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: cmd.exe /c set
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Self check
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %u;%u;%u;
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: /c ping.exe -n 6 127.0.0.1 & type "%s\System32\calc.exe" > "%s"
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ProfileImagePath
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: at.exe %u:%u "%s" /I
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ProgramData
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Self check ok!
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: powershell.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: qwinsta
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: net view
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%s
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Component_08
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Start screenshot
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: schtasks.exe /Delete /F /TN %u
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: appidapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %s \"$%s = \\\"%s\\\\; & $%s\"
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: c:\ProgramData
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Component_07
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: bUdiuy81gYguty@4frdRdpfko(eKmudeuMncueaN
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: powershell.exe -encodedCommand %S
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ERROR: GetModuleFileNameW() failed with error: %u
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: powershell.exe -encodedCommand
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SoNuce]ugdiB3c[doMuce2s81*uXmcvP
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: \System32\WindowsPowerShell\v1.0\powershell.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: schtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN %u /TR "%s" /NP /F
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: error res='%s' err=%d len=%u
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: netstat -nao
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: runas
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ipconfig /all
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SystemRoot
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: cscript.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: C:\INTERNAL\__empty
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_PhysicalMemory
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ALLUSERSPROFILE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: image/jpeg
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: LocalLow
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: displayName
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: shlwapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CommandLine
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: kernel32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SubmitSamplesConsent
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: 1234567890
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wbj.go
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_DiskDrive
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: System32
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Name
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: WRSA.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: c:\\
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SpyNetReporting
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: FALSE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aswhookx.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Packages
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: application/x-shockwave-flash
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: RepUx.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Winsta0
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: avp.exe;kavtray.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: root\SecurityCenter2
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: MsMpEng.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: userenv.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: csc_ui.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: \\.\pipe\
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: pstorec.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: NTUSER.DAT
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: from
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: netapi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: gdi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: setupapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: iphlpapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CrAmTray.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_ComputerSystem
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: user32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: \sf2.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: egui.exe;ekrn.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Software\Microsoft
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %S.%06d
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: bcrypt.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wtsapi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: shell32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: TRUE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_Bios
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: c:\hiberfil.sysss
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: */*
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ByteFence.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: type=0x%04X
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: snxhk_border_mywnd
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ROOT\CIMV2
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: https
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: fshoster32.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: kernelbase.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: regsvr32.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %s\system32\
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_Process
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: rundll32.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: LOCALAPPDATA
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: cmd.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: APPDATA
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: select
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: mcshield.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: advapi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ws2_32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .cfg
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_Product
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: WQL
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wininet.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: LastBootUpTime
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: urlmon.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Create
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_PnPEntity
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Initializing database...
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: winsta0\default
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .dat
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: WBJ_IGNORE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: next
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wpcap.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: image/pjpeg
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: fmon.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: vbs
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aswhooka.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SysWOW64
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: mpr.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: image/gif
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: crypt32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ntdll.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: open
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %u.%u.%u.%u.%u.%u.%04x
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SystemRoot
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: cscript.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: MBAMService.exe;mbamgui.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\xwizard.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\wermgr.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: AvastSvc.exe;aswEngSrv.exe;aswToolsSvc.exe;afwServ.exe;aswidsagent.exe;AvastUI.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: C:\INTERNAL\__empty
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_PhysicalMemory
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ALLUSERSPROFILE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: image/jpeg
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: LocalLow
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: displayName
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 6.1; rv:77.0) Gecko/20100101 Firefox/77.0
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: shlwapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\WerFault.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CommandLine
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: {%02X%02X%02X%02X-%02X%02X-%02X%02X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: kernel32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SubmitSamplesConsent
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: 1234567890
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wbj.go
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wextract.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_DiskDrive
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: vkise.exe;isesrv.exe;cmdagent.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: System32
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Name
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\WerFault.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: WRSA.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: c:\\
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: reg.exe ADD "HKLM\%s" /f /t %s /v "%s" /d "%s"
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SpyNetReporting
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: FALSE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aswhookx.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Packages
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SonicWallClientProtectionService.exe;SWDash.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: application/x-shockwave-flash
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Sophos UI.exe;SophosUI.exe;SAVAdminService.exe;SavService.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: RepUx.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\mspaint.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: coreServiceShell.exe;PccNTMon.exe;NTRTScan.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Winsta0
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption,Description,DeviceID,Manufacturer,Name,PNPDeviceID,Service,Status
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CynetEPS.exe;CynetMS.exe;CynetConsole.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\wermgr.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %ProgramFiles(x86)%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: avp.exe;kavtray.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: root\SecurityCenter2
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: MsMpEng.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: userenv.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: csc_ui.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: frida-winjector-helper-32.exe;frida-winjector-helper-64.exe;tcpdump.exe;windump.exe;ethereal.exe;wireshark.exe;ettercap.exe;rtsniff.exe;packetcapture.exe;capturenet.exe;qak_proxy;dumpcap.exe;CFF Explorer.exe;not_rundll32.exe;ProcessHacker.exe;tcpview.exe;filemon.exe;procmon.exe;idaq64.exe;loaddll32.exe;PETools.exe;ImportREC.exe;LordPE.exe;SysInspector.exe;proc_analyzer.exe;sysAnalyzer.exe;sniff_hit.exe;joeboxcontrol.exe;joeboxserver.exe;ResourceHacker.exe;x64dbg.exe;Fiddler.exe;sniff_hit.exe;sysAnalyzer.exe;BehaviorDumper.exe;processdumperx64.exe;anti-virus.EXE;sysinfoX64.exe;sctoolswrapper.exe;sysinfoX64.exe;FakeExplorer.exe;apimonitor-x86.exe;idaq.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: \\.\pipe\
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: pstorec.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: NTUSER.DAT
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: from
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\sethc.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: netapi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\Utilman.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: gdi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: setupapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELECT * FROM Win32_Processor
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: iphlpapi.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CrAmTray.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ccSvcHst.exe;NortonSecurity.exe;nsWscSvc.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_ComputerSystem
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\backgroundTaskHost.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %ProgramFiles%\Internet Explorer\iexplore.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Paths
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: user32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: xagtnotif.exe;AppUIMonitor.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\dxdiag.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SentinelServiceHost.exe;SentinelStaticEngine.exe;SentinelAgent.exe;SentinelStaticEngineScanner.exe;SentinelUI.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: \sf2.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\grpconv.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: egui.exe;ekrn.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Software\Microsoft
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %S.%06d
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: bcrypt.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELECT * FROM AntiVirusProduct
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SndVol.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\Utilman.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows Defender\SpyNet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wtsapi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: t=%s time=[%02d:%02d:%02d-%02d/%02d/%d]
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\xwizard.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: shell32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: TRUE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_Bios
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SELECT * FROM Win32_OperatingSystem
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mobsync.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: c:\hiberfil.sysss
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: */*
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\AtBroker.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ByteFence.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: type=0x%04X
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: snxhk_border_mywnd
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ROOT\CIMV2
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: dwengine.exe;dwarkdaemon.exe;dwwatcher.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: https
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: fshoster32.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: kernelbase.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: regsvr32.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %s\system32\
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\dxdiag.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_Process
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: rundll32.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: LOCALAPPDATA
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: cmd.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: APPDATA
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: select
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: mcshield.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: advapi32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ws2_32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .cfg
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aabcdeefghiijklmnoopqrstuuvwxyyz
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_Product
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: WQL
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wininet.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: LastBootUpTime
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: S:(ML;;NW;;;LW)
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\CertEnrollCtrl.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: urlmon.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Create
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Win32_PnPEntity
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\grpconv.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Initializing database...
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\SearchIndexer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: winsta0\default
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: .dat
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: WBJ_IGNORE
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: next
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\AtBroker.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: wpcap.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aaebcdeeifghiiojklmnooupqrstuuyvwxyyaz
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\sethc.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: image/pjpeg
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: fmon.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: bdagent.exe;vsserv.exe;vsservppl.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\SndVol.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: vbs
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: aswhooka.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: SysWOW64
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\mspaint.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: mpr.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: image/gif
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: crypt32.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: avgcsrvx.exe;avgsvcx.exe;avgcsrva.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: ntdll.dll
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: open
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\explorer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: CSFalconService.exe;CSFalconContainer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\wextract.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\System32\mobsync.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: %SystemRoot%\SysWOW64\SearchIndexer.exe
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpackString decryptor: Caption,Description,Vendor,Version,InstallDate,InstallSource,PackageName
            Source: 050_qbot.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10009E70 FindFirstFileW,FindNextFileW,

            Networking

            barindex
            Source: Malware configuration extractorIPs: 86.173.2.12:2222
            Source: Malware configuration extractorIPs: 92.9.45.20:2222
            Source: Malware configuration extractorIPs: 100.4.163.158:2222
            Source: Malware configuration extractorIPs: 213.64.33.92:2222
            Source: Malware configuration extractorIPs: 75.98.154.19:443
            Source: Malware configuration extractorIPs: 78.192.109.105:2222
            Source: Malware configuration extractorIPs: 88.126.94.4:50000
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 92.154.17.149:2222
            Source: Malware configuration extractorIPs: 24.234.220.88:993
            Source: Malware configuration extractorIPs: 87.252.106.39:995
            Source: Malware configuration extractorIPs: 174.4.89.3:443
            Source: Malware configuration extractorIPs: 12.172.173.82:20
            Source: Malware configuration extractorIPs: 90.29.86.138:2222
            Source: Malware configuration extractorIPs: 70.160.67.203:443
            Source: Malware configuration extractorIPs: 223.166.13.95:995
            Source: Malware configuration extractorIPs: 184.181.75.148:443
            Source: Malware configuration extractorIPs: 95.45.50.93:2222
            Source: Malware configuration extractorIPs: 201.143.215.69:443
            Source: Malware configuration extractorIPs: 64.121.161.102:443
            Source: Malware configuration extractorIPs: 2.82.8.80:443
            Source: Malware configuration extractorIPs: 188.28.19.84:443
            Source: Malware configuration extractorIPs: 81.101.185.146:443
            Source: Malware configuration extractorIPs: 79.77.142.22:2222
            Source: Malware configuration extractorIPs: 84.215.202.8:443
            Source: Malware configuration extractorIPs: 183.87.163.165:443
            Source: Malware configuration extractorIPs: 74.12.147.139:2078
            Source: Malware configuration extractorIPs: 74.12.147.139:2222
            Source: Malware configuration extractorIPs: 74.12.147.139:2222
            Source: Malware configuration extractorIPs: 74.12.147.139:2083
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 94.204.202.106:443
            Source: Malware configuration extractorIPs: 87.221.153.182:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:2087
            Source: Malware configuration extractorIPs: 24.234.220.88:990
            Source: Malware configuration extractorIPs: 2.49.63.160:2222
            Source: Malware configuration extractorIPs: 72.205.104.134:443
            Source: Malware configuration extractorIPs: 199.27.66.213:443
            Source: Malware configuration extractorIPs: 83.249.198.100:2222
            Source: Malware configuration extractorIPs: 90.104.151.37:2222
            Source: Malware configuration extractorIPs: 116.75.63.183:443
            Source: Malware configuration extractorIPs: 70.28.50.223:2078
            Source: Malware configuration extractorIPs: 117.195.17.148:993
            Source: Malware configuration extractorIPs: 77.126.99.230:443
            Source: Malware configuration extractorIPs: 45.62.70.33:443
            Source: Malware configuration extractorIPs: 24.234.220.88:465
            Source: Malware configuration extractorIPs: 203.109.44.236:995
            Source: Malware configuration extractorIPs: 75.109.111.89:443
            Source: Malware configuration extractorIPs: 161.142.103.187:995
            Source: Malware configuration extractorIPs: 77.86.98.236:443
            Source: Malware configuration extractorIPs: 147.147.30.126:2222
            Source: Malware configuration extractorIPs: 124.246.122.199:2222
            Source: Malware configuration extractorIPs: 103.123.223.133:443
            Source: Malware configuration extractorIPs: 180.151.19.13:2078
            Source: Malware configuration extractorIPs: 176.142.207.63:443
            Source: Malware configuration extractorIPs: 12.172.173.82:32101
            Source: Malware configuration extractorIPs: 103.140.174.20:2222
            Source: Malware configuration extractorIPs: 70.50.83.216:2222
            Source: Malware configuration extractorIPs: 12.172.173.82:465
            Source: Malware configuration extractorIPs: 38.2.18.164:443
            Source: Malware configuration extractorIPs: 93.187.148.45:995
            Source: Malware configuration extractorIPs: 70.64.77.115:443
            Source: Malware configuration extractorIPs: 12.172.173.82:21
            Source: Malware configuration extractorIPs: 70.49.205.198:2222
            Source: Malware configuration extractorIPs: 27.0.48.233:443
            Source: Malware configuration extractorIPs: 12.172.173.82:50001
            Source: Malware configuration extractorIPs: 83.110.223.61:443
            Source: Malware configuration extractorIPs: 103.141.50.43:995
            Source: Malware configuration extractorIPs: 85.101.239.116:443
            Source: Malware configuration extractorIPs: 103.42.86.42:995
            Source: Malware configuration extractorIPs: 92.1.170.110:995
            Source: Malware configuration extractorIPs: 81.229.117.95:2222
            Source: Malware configuration extractorIPs: 124.122.47.148:443
            Source: Malware configuration extractorIPs: 103.212.19.254:995
            Source: Malware configuration extractorIPs: 103.139.242.6:443
            Source: Malware configuration extractorIPs: 125.99.76.102:443
            Source: Malware configuration extractorIPs: 50.68.186.195:443
            Source: Malware configuration extractorIPs: 47.205.25.170:443
            Source: Malware configuration extractorIPs: 12.172.173.82:993
            Source: Malware configuration extractorIPs: 12.172.173.82:22
            Source: Malware configuration extractorIPs: 70.28.50.223:32100
            Source: Malware configuration extractorIPs: 79.168.224.165:2222
            Source: Malware configuration extractorIPs: 121.121.108.120:995
            Source: Malware configuration extractorIPs: 69.160.121.6:61201
            Source: Malware configuration extractorIPs: 200.84.211.255:2222
            Source: Malware configuration extractorIPs: 201.244.108.183:995
            Source: Malware configuration extractorIPs: 93.187.148.45:443
            Source: Malware configuration extractorIPs: 85.61.165.153:2222
            Source: Malware configuration extractorIPs: 184.182.66.109:443
            Source: Malware configuration extractorIPs: 175.156.217.7:2222
            Source: Malware configuration extractorIPs: 70.28.50.223:3389
            Source: Malware configuration extractorIPs: 114.143.176.236:443
            Source: Malware configuration extractorIPs: 65.95.141.84:2222
            Source: Malware configuration extractorIPs: 80.6.50.34:443
            Source: Malware configuration extractorIPs: 12.172.173.82:2087
            Source: Malware configuration extractorIPs: 47.199.241.39:443
            Source: Malware configuration extractorIPs: 66.241.183.99:443
            Source: Malware configuration extractorIPs: 113.11.92.30:443
            Source: Malware configuration extractorIPs: 186.75.95.6:443
            Source: Malware configuration extractorIPs: 125.99.69.178:443
            Source: Malware configuration extractorIPs: 109.130.247.84:2222
            Source: Malware configuration extractorIPs: 96.56.197.26:2222
            Source: Malware configuration extractorIPs: 70.50.1.252:2222
            Source: Malware configuration extractorIPs: 91.160.70.68:32100
            Source: Malware configuration extractorIPs: 67.70.120.249:2222
            Source: Malware configuration extractorIPs: 209.171.160.69:995
            Source: Malware configuration extractorIPs: 98.163.227.79:443
            Source: Malware configuration extractorIPs: 176.133.4.230:995
            Source: Malware configuration extractorIPs: 24.234.220.88:995
            Source: Malware configuration extractorIPs: 45.62.75.250:443
            Source: Malware configuration extractorIPs: 200.44.198.47:2222
            Source: Malware configuration extractorIPs: 173.17.45.60:443
            Source: Malware configuration extractorIPs: 5.192.141.228:2222
            Source: Malware configuration extractorIPs: 184.63.133.131:995
            Source: Malware configuration extractorIPs: 70.28.50.223:2083
            Source: Malware configuration extractorIPs: 78.82.143.154:2222
            Source: Malware configuration extractorIPs: 73.88.173.113:443
            Source: Malware configuration extractorIPs: 181.4.225.225:443
            Source: Malware configuration extractorIPs: 24.234.220.88:443
            Source: Malware configuration extractorIPs: 174.58.146.57:443
            Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
            Source: Joe Sandbox ViewASN Name: MEO-RESIDENCIALPT MEO-RESIDENCIALPT
            Source: Joe Sandbox ViewIP Address: 38.2.18.164 38.2.18.164
            Source: Joe Sandbox ViewIP Address: 2.82.8.80 2.82.8.80
            Source: unknownNetwork traffic detected: IP country count 26
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
            Source: 050_qbot.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
            Source: 050_qbot.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
            Source: 050_qbot.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0C
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0H
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0I
            Source: 050_qbot.dllString found in binary or memory: http://ocsp.digicert.com0O
            Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
            Source: 050_qbot.dllString found in binary or memory: http://www.digicert.com/CPS0
            Source: 050_qbot.dllString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
            Source: 050_qbot.dllString found in binary or memory: https://www.digicert.com/CPS0
            Source: loaddll32.exe, 00000000.00000002.636815612.00000000009EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: 050_qbot.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
            Source: 16.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 16.2.rundll32.exe.34c0930.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: 16.2.rundll32.exe.34c0930.0.unpack, type: UNPACKEDPEMatched rule: MAL_QakBot_ConfigExtraction_Feb23 cape_options = bp0=$params+23,action0=setdump:eax::ecx,bp1=$c2list1+40,bp1=$c2list2+38,action1=dump,bp2=$conf+13,action2=dump,count=1,typestring=QakBot Config, date = 2023-02-17, author = kevoreilly, description = QakBot Config Extraction, reference = https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar, license = https://github.com/kevoreilly/CAPEv2/blob/master/LICENSE, packed = f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 656
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\Windows\AppCompat\Programs\Amcache.hve.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADAACE0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADA6880
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10018E20
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10003A40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100172EF
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100132F1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10016F30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10014B53
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100144D8 NtProtectVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000A51F NtAllocateVirtualMemory,NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000A93E GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000AA38 GetLastError,NtResumeThread,FindCloseChangeNotification,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000CAF3 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,
            Source: 050_qbot.dllStatic PE information: Number of sections : 15 > 10
            Source: 050_qbot.dllReversingLabs: Detection: 45%
            Source: 050_qbot.dllVirustotal: Detection: 57%
            Source: 050_qbot.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 656
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 660
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 652
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 668
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\wermgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Qvbfzum
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4D.tmpJump to behavior
            Source: classification engineClassification label: mal96.troj.evad.winDLL@30/20@0/99
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000D2F7 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000C800 CreateToolhelp32Snapshot,Process32First,Process32Next,FindCloseChangeNotification,
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5292:120:WilError_01
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7188
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{93949AA0-41C4-44AB-A074-A11516FF3DDC}
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1832
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1976
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6E7B7C95-A00D-48C0-937E-8C33627341B7}
            Source: C:\Windows\SysWOW64\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{6E7B7C95-A00D-48C0-937E-8C33627341B7}
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5700
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: 050_qbot.dllStatic PE information: More than 104 > 100 exports found
            Source: 050_qbot.dllStatic PE information: Image base 0x6ad80000 > 0x60000000
            Source: 050_qbot.dllStatic PE information: section name: /4
            Source: 050_qbot.dllStatic PE information: section name: /14
            Source: 050_qbot.dllStatic PE information: section name: /29
            Source: 050_qbot.dllStatic PE information: section name: /41
            Source: 050_qbot.dllStatic PE information: section name: /55
            Source: 050_qbot.dllStatic PE information: section name: /67
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD814B0 GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,
            Source: 050_qbot.dllStatic PE information: real checksum: 0xc341d should be: 0xbfd40

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 7356 base: 13D3C50 value: E9 63 D7 DC FE
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exe TID: 2764Thread sleep count: 193 > 30
            Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
            Source: C:\Windows\SysWOW64\wermgr.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000B967 GetSystemInfo,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10009E70 FindFirstFileW,FindNextFileW,
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
            Source: Amcache.hve.9.drBinary or memory string: VMware
            Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: Amcache.hve.9.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
            Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.9.drBinary or memory string: VMware7,1
            Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.me
            Source: Amcache.hve.9.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
            Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
            Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.18227214.B64.2106252220,BiosReleaseDate:06/25/2021,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD814B0 GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6AD81F50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_3_04D42297 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10001015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100021CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADC5370 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,EnterCriticalSection,TlsGetValue,GetLastError,TlsGetValue,GetLastError,LeaveCriticalSection,

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 1D0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 1A0000
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 13D3C50
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 1A0000 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\wermgr.exe base: 1D0000 protect: page read and write
            Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\wermgr.exe base: 1A0000 value starts with: 4D5A
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wermgr.exe C:\Windows\SysWOW64\wermgr.exe
            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wermgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADB3D50 cpuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6ADC52A0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000BC31 GetCurrentProcessId,GetLastError,GetVersionExA,GetWindowsDirectoryW,
            Source: rundll32.exe, 00000010.00000003.379604976.000000000503F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: rundll32.exe, 00000010.00000003.379604976.000000000503F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
            Source: rundll32.exe, 00000010.00000003.379604976.000000000503F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: Amcache.hve.9.drBinary or memory string: c:\users\user\desktop\procexp.exe
            Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: rundll32.exe, 00000010.00000003.379604976.000000000503F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
            Source: rundll32.exe, 00000010.00000003.379604976.000000000503F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: Amcache.hve.9.drBinary or memory string: procexp.exe
            Source: rundll32.exe, 00000010.00000003.379604976.000000000503F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 16.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.34c0930.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.34c0930.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000010.00000002.387277732.0000000004FC0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.387218469.00000000034AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 16.2.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.34c0930.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 16.2.rundll32.exe.34c0930.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000010.00000002.387277732.0000000004FC0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.387218469.00000000034AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts3
            Native API
            Path Interception311
            Process Injection
            11
            Masquerading
            1
            Credential API Hooking
            1
            System Time Discovery
            Remote Services1
            Credential API Hooking
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
            Virtualization/Sandbox Evasion
            1
            Input Capture
            21
            Security Software Discovery
            Remote Desktop Protocol1
            Input Capture
            Exfiltration Over Bluetooth1
            Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)311
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Archive Collected Data
            Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Rundll32
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync24
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 882803 Sample: 050_qbot.dll Startdate: 06/06/2023 Architecture: WINDOWS Score: 96 32 103.212.19.254 VNET-ASVNETNETWORKSPVTLTDIN India 2->32 34 184.63.133.131 VIASAT-SP-BACKBONEUS United States 2->34 36 97 other IPs or domains 2->36 38 Found malware configuration 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Yara detected Qbot 2->42 44 2 other signatures 2->44 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 cmd.exe 1 9->14         started        16 rundll32.exe 9->16         started        18 8 other processes 9->18 signatures6 46 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->46 48 Writes to foreign memory regions 11->48 50 Allocates memory in foreign processes 11->50 52 Injects a PE file into a foreign processes 11->52 20 wermgr.exe 11->20         started        22 rundll32.exe 14->22         started        24 WerFault.exe 26 10 16->24         started        26 WerFault.exe 9 18->26         started        28 WerFault.exe 9 18->28         started        process7 process8 30 WerFault.exe 4 9 22->30         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            050_qbot.dll46%ReversingLabsWin32.Trojan.Zusy
            050_qbot.dll57%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://upx.sf.netAmcache.hve.9.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              38.2.18.164
              unknownUnited States
              174COGENT-174UStrue
              2.82.8.80
              unknownPortugal
              3243MEO-RESIDENCIALPTtrue
              70.160.67.203
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              83.110.223.61
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              209.171.160.69
              unknownCanada
              852ASN852CAtrue
              84.215.202.8
              unknownNorway
              41164GET-NOGETNorwayNOtrue
              184.182.66.109
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              200.84.211.255
              unknownVenezuela
              8048CANTVServiciosVenezuelaVEtrue
              125.99.69.178
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              174.4.89.3
              unknownCanada
              6327SHAWCAtrue
              121.121.108.120
              unknownMalaysia
              9534MAXIS-AS1-APBinariangBerhadMYtrue
              161.142.103.187
              unknownMalaysia
              9930TTNET-MYTIMEdotComBerhadMYtrue
              213.64.33.92
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              114.143.176.236
              unknownIndia
              17762HTIL-TTML-IN-APTataTeleservicesMaharashtraLtdINtrue
              24.234.220.88
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              67.70.120.249
              unknownCanada
              577BACOMCAtrue
              73.88.173.113
              unknownUnited States
              7922COMCAST-7922UStrue
              72.205.104.134
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              117.195.17.148
              unknownIndia
              9829BSNL-NIBNationalInternetBackboneINtrue
              69.160.121.6
              unknownJamaica
              33576DIG001JMtrue
              176.133.4.230
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              183.87.163.165
              unknownIndia
              132220JPRDIGITAL-INJPRDigitalPvtLtdINtrue
              184.181.75.148
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              70.49.205.198
              unknownCanada
              577BACOMCAtrue
              87.221.153.182
              unknownSpain
              12479UNI2-ASEStrue
              70.50.1.252
              unknownCanada
              577BACOMCAtrue
              85.101.239.116
              unknownTurkey
              9121TTNETTRtrue
              181.4.225.225
              unknownArgentina
              7303TelecomArgentinaSAARtrue
              100.4.163.158
              unknownUnited States
              701UUNETUStrue
              103.141.50.43
              unknownIndia
              133693SKISP-AS-INSriKrishnaInternetServicesPrivateLimitedItrue
              70.50.83.216
              unknownCanada
              577BACOMCAtrue
              92.1.170.110
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              64.121.161.102
              unknownUnited States
              6079RCN-ASUStrue
              96.56.197.26
              unknownUnited States
              6128CABLE-NET-1UStrue
              188.28.19.84
              unknownUnited Kingdom
              206067H3GUKGBtrue
              125.99.76.102
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              81.101.185.146
              unknownUnited Kingdom
              5089NTLGBtrue
              116.75.63.183
              unknownIndia
              17488HATHWAY-NET-APHathwayIPOverCableInternetINtrue
              124.246.122.199
              unknownSingapore
              63850ENTRUSTICT-AS-APQRHUBPTYLTDTAEntrustICTAUtrue
              147.147.30.126
              unknownUnited Kingdom
              6871PLUSNETUKInternetServiceProviderGBtrue
              109.130.247.84
              unknownBelgium
              5432PROXIMUS-ISP-ASBEtrue
              75.109.111.89
              unknownUnited States
              19108SUDDENLINK-COMMUNICATIONSUStrue
              88.126.94.4
              unknownFrance
              12322PROXADFRtrue
              124.122.47.148
              unknownThailand
              17552TRUE-AS-APTrueInternetCoLtdTHtrue
              66.241.183.99
              unknownUnited States
              16604HUNTEL-NETUStrue
              180.151.19.13
              unknownIndia
              10029SHYAMSPECTRA-ASSHYAMSPECTRAPVTLTDINtrue
              94.204.202.106
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              47.205.25.170
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              95.45.50.93
              unknownIreland
              5466EIRCOMInternetHouseIEtrue
              103.212.19.254
              unknownIndia
              132956VNET-ASVNETNETWORKSPVTLTDINtrue
              85.61.165.153
              unknownSpain
              12479UNI2-ASEStrue
              91.160.70.68
              unknownFrance
              12322PROXADFRtrue
              201.143.215.69
              unknownMexico
              8151UninetSAdeCVMXtrue
              184.63.133.131
              unknownUnited States
              7155VIASAT-SP-BACKBONEUStrue
              203.109.44.236
              unknownIndia
              135777NECONN-ASShreenortheastConnectAndServicesPvtLtdINtrue
              90.104.151.37
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              201.244.108.183
              unknownColombia
              19429ETB-ColombiaCOtrue
              2.49.63.160
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              103.42.86.42
              unknownIndia
              133660EDIGITAL-ASE-InfrastructureandEntertainmentIndiaPvtLttrue
              80.6.50.34
              unknownUnited Kingdom
              5089NTLGBtrue
              175.156.217.7
              unknownSingapore
              4773MOBILEONELTD-AS-APMobileOneLtdMobileInternetServicePrtrue
              103.139.242.6
              unknownIndia
              138798MUTINY-AS-INMutinySystemsPrivateLimitedINtrue
              27.0.48.233
              unknownIndia
              132573SAINGN-AS-INSAINGNNetworkServicesINtrue
              70.28.50.223
              unknownCanada
              577BACOMCAtrue
              173.17.45.60
              unknownUnited States
              30036MEDIACOM-ENTERPRISE-BUSINESSUStrue
              81.229.117.95
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEtrue
              70.64.77.115
              unknownCanada
              6327SHAWCAtrue
              87.252.106.39
              unknownItaly
              48544TECNOADSL-ASITtrue
              79.77.142.22
              unknownUnited Kingdom
              9105TISCALI-UKTalkTalkCommunicationsLimitedGBtrue
              98.163.227.79
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUStrue
              93.187.148.45
              unknownUnited Kingdom
              8680SURE-INTERNATIONAL-LIMITEDGBtrue
              186.75.95.6
              unknownPanama
              11556CableWirelessPanamaPAtrue
              50.68.186.195
              unknownCanada
              6327SHAWCAtrue
              45.62.70.33
              unknownCanada
              40440NRTC-CAtrue
              83.249.198.100
              unknownSweden
              39651COMHEM-SWEDENSEtrue
              12.172.173.82
              unknownUnited States
              2386INS-ASUStrue
              47.199.241.39
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              79.168.224.165
              unknownPortugal
              2860NOS_COMUNICACOESPTtrue
              199.27.66.213
              unknownUnited States
              40608HCTNEBRASKAUStrue
              200.44.198.47
              unknownVenezuela
              8048CANTVServiciosVenezuelaVEtrue
              176.142.207.63
              unknownFrance
              5410BOUYGTEL-ISPFRtrue
              86.173.2.12
              unknownUnited Kingdom
              2856BT-UK-ASBTnetUKRegionalnetworkGBtrue
              45.62.75.250
              unknownCanada
              40440NRTC-CAtrue
              92.154.17.149
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              90.29.86.138
              unknownFrance
              3215FranceTelecom-OrangeFRtrue
              174.58.146.57
              unknownUnited States
              7922COMCAST-7922UStrue
              223.166.13.95
              unknownChina
              17621CNCGROUP-SHChinaUnicomShanghainetworkCNtrue
              5.192.141.228
              unknownUnited Arab Emirates
              5384EMIRATES-INTERNETEmiratesInternetAEtrue
              65.95.141.84
              unknownCanada
              577BACOMCAtrue
              75.98.154.19
              unknownUnited States
              32444SAFELINK-MVUStrue
              77.126.99.230
              unknownIsrael
              9116GOLDENLINES-ASNPartnerCommunicationsMainAutonomousSystetrue
              103.123.223.133
              unknownIndia
              138329KWS-AS-APKenstarWebSolutionsPrivateLimitedINtrue
              74.12.147.139
              unknownCanada
              577BACOMCAtrue
              92.9.45.20
              unknownUnited Kingdom
              13285OPALTELECOM-ASTalkTalkCommunicationsLimitedGBtrue
              113.11.92.30
              unknownBangladesh
              7565BDCOM-BDRangsNiluSquare5thFloorHouse75Road5ADtrue
              77.86.98.236
              unknownUnited Kingdom
              12390KINGSTON-UK-ASGBtrue
              103.140.174.20
              unknownIndia
              138763PRAVEEN1-ASPraveenTelecomPvtLtdINtrue
              78.192.109.105
              unknownFrance
              12322PROXADFRtrue
              78.82.143.154
              unknownSweden
              2119TELENOR-NEXTELTelenorNorgeASNOtrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:882803
              Start date and time:2023-06-06 20:24:46 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 11m 13s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Run name:Run with higher sleep bypass
              Number of analysed new started processes analysed:27
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:050_qbot.dll
              Original Sample Name:050_qbot.dat
              Detection:MAL
              Classification:mal96.troj.evad.winDLL@30/20@0/99
              EGA Information:
              • Successful, ratio: 50%
              HDC Information:
              • Successful, ratio: 27.4% (good quality ratio 26.1%)
              • Quality average: 78.3%
              • Quality standard deviation: 25.4%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .dll
              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 52.168.117.173, 20.189.173.20, 104.208.16.94
              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, watson.telemetry.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
              • Execution Graph export aborted for target rundll32.exe, PID 5700 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              No simulations
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9060660549007946
              Encrypted:false
              SSDEEP:192:GAim40oXcHBUZMX4jed+U/u7seS274ItWc:9im+XkBUZMX4jeh/u7seX4ItWc
              MD5:7F7C850682DBA15BF928C8E6A7E492AD
              SHA1:101ED5ABA46AF7CFD844FBA30ACB35DE3054B093
              SHA-256:5774B34464FB8F9938F0EFC53566AA04544AF7AE2B95F4E9F5B40A0A16A9B0D9
              SHA-512:5547496657B521C16D2E4ACC8385279F7F82372FA9BC2209409C14135ECEE7280EBE16D5C7479F5A705A12EDAEBC739B470CBF0D0526C9DC6E59F8601D598DCF
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.9.4.1.3.7.0.7.3.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.9.4.2.4.6.4.4.4.8.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.5.a.4.5.f.3.6.-.c.2.6.1.-.4.2.d.9.-.b.f.c.5.-.a.b.a.d.3.b.4.b.4.7.a.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.4.4.4.a.7.9.2.-.2.3.7.2.-.4.5.6.2.-.8.a.f.0.-.4.7.b.e.e.c.c.d.d.d.4.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.4.4.-.0.0.0.1.-.0.0.1.f.-.2.1.a.8.-.2.6.b.c.e.f.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9062132027943343
              Encrypted:false
              SSDEEP:192:3dTio40oXCHBUZMX4jed+U/u7seS274ItWc:NTio+XaBUZMX4jeh/u7seX4ItWc
              MD5:E18F904FF756D86934839EBD90F3F60B
              SHA1:23611971DB0416529DB7834394CC9A5F71EFEB96
              SHA-256:B00915EBA17D8A85A40D98DAF04A779EC31F790D6A9B909E394F3164FBF4FA94
              SHA-512:6C1C9BAFB93ABFA0C6855128976B85EF0EA90A264DDFCFD64E2EEA4F62DC4B260707E4957E940CDF9047FE168058F583F37FDCD56FDE876DD04581F545EFD610
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.9.4.1.5.9.2.7.9.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.9.4.2.5.9.2.8.1.5.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.d.0.6.a.c.c.-.1.8.6.6.-.4.8.1.2.-.8.c.7.d.-.d.9.1.b.d.6.1.f.d.6.a.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.5.3.6.b.e.1.0.-.7.d.a.d.-.4.e.5.e.-.a.e.3.e.-.c.e.3.7.0.6.0.d.c.7.8.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.b.8.-.0.0.0.1.-.0.0.1.f.-.1.a.6.c.-.2.9.b.c.e.f.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.905905833425882
              Encrypted:false
              SSDEEP:192:ULjmiAI40oX2HBUZMX4jed+U/u7seS274ItWc:BiAI+XuBUZMX4jeh/u7seX4ItWc
              MD5:995C080576939E2E9CFBDB6ACD300E4C
              SHA1:14988210C0695EBFB3ACA25CEDA2AD99FBA05299
              SHA-256:CA914C1B1A0D8ED32B9CD7C997E96F444D9C1B5FF7DD2E1970E0F043948C881D
              SHA-512:CEC980E0D29AFB7DB0EB021B84DCBD684AA5C0898A7E2807372A66AEA2063340FC3DE8057145FC5216109E82AED09552E58632E89F21161924F4975B32CD1442
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.9.5.0.4.6.4.5.2.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.9.5.1.5.2.7.0.1.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.8.e.b.2.d.1.7.-.6.b.3.d.-.4.6.4.a.-.a.1.a.6.-.e.f.d.2.6.e.d.6.4.f.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.a.1.2.9.a.c.-.b.2.0.1.-.4.c.a.5.-.8.3.f.f.-.d.f.0.4.6.0.6.9.6.c.6.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.2.8.-.0.0.0.1.-.0.0.1.f.-.a.f.0.e.-.9.a.c.1.e.f.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.9060979377834559
              Encrypted:false
              SSDEEP:192:YSi+40oXEHBUZMX4jed+U/u7seS274ItWc:Ji++XMBUZMX4jeh/u7seX4ItWc
              MD5:01CE06A538FFE777AD9BB048A7675E5C
              SHA1:38098A62623DBF2235CB460B7CABC930BDA805BD
              SHA-256:620302D509B4B5D89EC4DB5C3F6348E0938BB643186E82BF20E4C008C18442BD
              SHA-512:0362E375CDBBBEC279307179215989C9B02284981D9DA76E59A901C8F78CC7A2CBBF0C6DBB0498FA2CF9FFBFBE9CF099AC6529A608A382CD03A4CD83ACBAC3DF
              Malicious:false
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.0.5.8.1.9.5.0.6.7.0.8.8.4.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.0.5.8.1.9.5.1.7.1.7.7.5.4.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.d.c.5.e.d.a.-.d.b.b.7.-.4.d.0.1.-.9.9.7.1.-.9.5.5.7.f.5.a.a.c.4.d.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.6.e.a.d.b.9.-.e.9.2.c.-.4.b.6.c.-.a.3.5.3.-.0.2.e.a.c.d.c.8.e.b.9.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.1.4.-.0.0.0.1.-.0.0.1.f.-.f.3.d.f.-.c.9.c.1.e.f.9.8.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:50 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):37174
              Entropy (8bit):2.317864308905028
              Encrypted:false
              SSDEEP:192:IFiZLZ53+e+WEM0reO5SkboN1FJtX964Vij6SNLMvzQ24Xr8n76:RF+DR5LboNJthc+/Q2D7
              MD5:2B616A0CA983C14AC3D83E0F3495EE4B
              SHA1:15B2C44C5938059887E56DE71748E316D455F9B3
              SHA-256:17CBE816778365EFFCF369668625746FC2CDCADCE42B8F6314393DF781B81E4A
              SHA-512:88C74F5872C3074EA7DA8089592333652868D11AF1FD360425144EE0654416B208C5A3DEAFF544BF1D7599C1DAB04E30E0D4FF8C0F09AB5847E22D9ED335DB53
              Malicious:false
              Preview:MDMP....... ..........d............d...............l............)..........T.......8...........T...............6w...........................................................................................U...........B..............GenuineIntelW...........T.......(......d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:51 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):39014
              Entropy (8bit):2.191153821853169
              Encrypted:false
              SSDEEP:192:VnWLZ53+e+dwruO5SkbOjkrdgF2WSSn6qOiAY0lTue:4F++5LbOIrdk2l7qOile
              MD5:C96C8DC5EAAFBFB42D5A7297472E46EE
              SHA1:B7E892B77EFE7B3E195D9F9D19EFD18ABCAAF63C
              SHA-256:24F2427919EB7A35B413A27FA85E46D3EC404EF7E81D307132F42E48D3F2A7AD
              SHA-512:6FD7A7600EFE809C32CA761BBAABCEA59D6A8CE2B5F416DE1C18BB53AF8478C263E9A89F4A442688A5EDEF858012372257003DD618AFAD445D9241FB22962B95
              Malicious:false
              Preview:MDMP....... ..........d............d...............l............)..........T.......8...........T...............f~...........................................................................................U...........B..............GenuineIntelW...........T..............d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8252
              Entropy (8bit):3.692245507389942
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNi1n6Zme6YZDS6ikgmfTTSWCprv89bpJsfy8jm:RrlsNi16B6YNS6xgmfTTSOpife
              MD5:72BDC85578B37CACA3F1856E4B383A6A
              SHA1:40D2CCDDD4162356C415E6BE0B9EBD8900B2F2A1
              SHA-256:47DE9DB3839CD33E840D5A14826F0691C36C060008B7D8341674BE464CC69135
              SHA-512:41F248E855424CFFEA3E2C4928BE76BB397BE6CFC70A835D550F2B020B9C84EA530AD0B1F41713C03F4DBC1A859A2ECCC02790FC2FB140DABBF4DCAD28DEB78C
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.8.3.2.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.454274396659317
              Encrypted:false
              SSDEEP:48:cvIwSD8zsLJgtWI9t/dWgc8sqYjM8fm8M4JCdspFPX+q8/MCH4SrSud:uITfl6sgrsqYlJ1XaHDWud
              MD5:6C8F37E6A008A0A59C16301BEABEBE9C
              SHA1:E29CCED7C3C6D2C73F11BF30BFA519E599CA87C1
              SHA-256:09AEE16D0CCED2ABE8EA8D5B069E25F542C55F232B49243DDE21ED71BAA87CF8
              SHA-512:879E21F4D96DA710340F2DE6B08681D963CC50715277600B6E17D2CBCDFC8B9AA72189952771E25B81336EEA67AF882142D55F0CBDA8C7ECB0D337521DF314D6
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074356" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8252
              Entropy (8bit):3.692757462252324
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNizQ6/6YZD/6ikgmfTLSWCprZ89bgssfSgm:RrlsNik6/6YN/6xgmfTLSIg/fE
              MD5:E9ECD5B39648C6AFEBF44CEFF07AAADC
              SHA1:C8F978DD7A76D9192383346D538827C1D1E5F798
              SHA-256:50500C49AEDC33EF4F2A8DF289A90C4BB6B8A89483D559EE73F97DC6F0B49AD6
              SHA-512:B1A4554F1E6B05DCEA8644712D54139892A3AEE0685C8B23641DFF2966EBE66479428203EF665288EAF85E2B91A2FE828DEC76B024D783062F168A426B856000
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.8.8.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.452389309184308
              Encrypted:false
              SSDEEP:48:cvIwSD8zsLJgtWI9t/dWgc8sqYjsFa8fm8M4JCdspFfk+q8/MR4SrSDd:uITfl6sgrsqYwRJu5DWDd
              MD5:3CA38CCF6BDFBA325C2EF25343E15603
              SHA1:F3D1418A1C7F96B00ED9BF0DB735F9CD932AA5DF
              SHA-256:FA5ACAF2790757B1C445538AFC50C74D6A6D30C85D98893DE779A001E26AA0DC
              SHA-512:4B27D3762C2A10B735A96EF2FD643EACC4467AE95B04DE0F7BAAAA5F09E0DEB2E8FC25099072E16BE21D33EC3E800A53664E923394AC6606216114AE8B1DD625
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074356" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:41 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):43746
              Entropy (8bit):2.1428929815975426
              Encrypted:false
              SSDEEP:192:Is0x7ngyoO5SkbVWUCctA9SNy+/paSFuRn:IFj5LbVWUtt4JEpapR
              MD5:7B3622589090129AA19FADF144B6E42A
              SHA1:5940A82F429AAD08CB0B9280751967EF0BFC0970
              SHA-256:B35EA94EBDBA0D07D33E211626A966FAA710308BE0EF9711C935DECE82A4B304
              SHA-512:1AB2ECD36DC67866911EB3E0E11C9C1F3689667B2DDCDE6C22895655F17E6CCE4DBD779032E9DD4D91F79B3A4FD561245AB0F2C7AB06BC631742C600EF350323
              Malicious:false
              Preview:MDMP....... ..........d.........................................,..........T.......8...........T..........................0................................................................................U...........B..............GenuineIntelW...........T.......D......d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:41 2023, 0x1205a4 type
              Category:dropped
              Size (bytes):38558
              Entropy (8bit):2.2124972339938953
              Encrypted:false
              SSDEEP:192:IsVlLZ53+e+o1reO5SkbzSBxj1k9ZPGqMxZW7JUKY2vn:IiF++5LbzwJk9ZeqM86KB
              MD5:5C6C4D83EA00176E0DFBA03475271746
              SHA1:969145BFC27A1DDCFFC06E44A472067820B081DD
              SHA-256:0B2BBDA91E3442034E07703BD9BFF5241F9AD642587B9B615FF1E50F0459C7F6
              SHA-512:285D45EC582B9D7FDFCE7EA19E3ABD83D7CBC5E2483928AFDA8DD0F11FA0F81B3121C50BC48E67691D8E7BC80FC932844786D2F3F587CC00EDBFBA77C661EB35
              Malicious:false
              Preview:MDMP....... ..........d............d...............l............)..........T.......8...........T...........P...N|...........................................................................................U...........B..............GenuineIntelW...........T..............d.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8248
              Entropy (8bit):3.694094490354603
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNiXO6a6YZ26dgmfTTSWCpr089bB/sf06rm:RrlsNi+6a6YI6dgmfTTSvBkfi
              MD5:A21D88E7981F56CC46A90F57F53972D6
              SHA1:D5093E24C5CC56E9ECEA3A43F5CAD3D80E8E0A98
              SHA-256:206588D549B20686CB1F155AB6049B635D4EA96B821FEF384EBC21207E047C05
              SHA-512:9E2A2DDB238BA30A3ACFFF3BAE1D01D1F03F351896883DEB01149990717F9B50FD131ADFE5EEB05EC43375FF9F5515CB2C286BC33D3D20DE5F4C6F9271334801
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.0.0.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.45534085822935
              Encrypted:false
              SSDEEP:48:cvIwSD8zsLJgtWI9t/dWgc8sqYjuF8fm8M4JCdspFJ+q8/Mv4SrS8d:uITfl6sgrsqYVJLHDW8d
              MD5:4C69E8CD52A3A369CF81CFD737E63172
              SHA1:EEC76E1A6174C76DBDB7184F053A8ECCA5662889
              SHA-256:FB8BC7D4DD3F94618EC50274CBE71E10AAFAF18FAF4E8C3B061F6F903C184EE6
              SHA-512:6EBF56ACDF455D30A3C44C9EEFD8C690045EC6C4FA7BFF85E60EC2B30A4C860436A9BAED9B596BD775549DCD15A914885351CC1E4C95B7321BCAD1CD363C164E
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074356" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8244
              Entropy (8bit):3.6932591855962444
              Encrypted:false
              SSDEEP:192:Rrl7r3GLNic26NQ6YQJs6HpgTgmfTTSWCpr089bB3sfSrm:RrlsNid6K6YQy6HqTgmfTTSvB8fH
              MD5:84CB2DA57527BC2B15FF93AF7F524D66
              SHA1:FE7FC92B0598DE0060E74954CF7FB5F70248830A
              SHA-256:8734DCC5A56679616999DE7C13F8E58B7A70E6CB867F89F9F2498955234171D5
              SHA-512:1921809599E6059BB6852EECA45E63B50907C4D338179F83ECC7ECA291D5F945FF7D0E04766CD65FFDB3B6033025ADC66F808C1A24ABDE0C4B7A197310815EBB
              Malicious:false
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.9.7.6.<./.P.i.d.>.......
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4630
              Entropy (8bit):4.454444596295058
              Encrypted:false
              SSDEEP:48:cvIwSD8zsLJgtWI9t/dWgc8sqYjG8fm8M4JCdspFFR+q8/MI64SrS9d:uITfl6sgrsqYPJV5DW9d
              MD5:AF85D2BA9B6A3AB9BC2D7979911793F8
              SHA1:4684523100C85371CB64A5EDEF53E5ABFC3BD4AF
              SHA-256:BB6635F876FB137484D24EFA700DED15D4EBB5F296B16D817F1CADFD17B64525
              SHA-512:DB7271433D9DD11A3199DCB06B571B2A7C2B81C17611827D0F1182D2C644063CC2C379CD230CA44825664AA112F9A3A98F6E115A6FE351D6983D62FA9683AF34
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2074356" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):1572864
              Entropy (8bit):4.294555722596347
              Encrypted:false
              SSDEEP:12288:1eaEPkmE951SV8Jabh1RG5NKGBfG+MVyS+lS4qSFFn8VmPCmbT6OVIK:hEPkmE951SV8Ja2PK
              MD5:C94F70AD3D8D78DFF09790176BBE444D
              SHA1:2EF59C3ADC2D7D312B095E2A2E062AE76B0234BC
              SHA-256:1537FC96394ED3132B0E4F3821D1AD5DE0B82BC0D92C8158DF50C066B20C08EA
              SHA-512:8DE4EA62053F6E789CE1B104860DE4D7E39591FAA61C6C0B181024832ECED0ED60BD06CA57061F624DC30B672F53F90B025A98B1C60D1D8ABF520CC66D12EEDB
              Malicious:false
              Preview:regfj...j...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm*.|.................................................................................................................................................................................................................................................................................................................................................nu.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):16384
              Entropy (8bit):3.8302504002616358
              Encrypted:false
              SSDEEP:384:0U55Rftx1gPJ4JzwHFnql9OZIRCMYVBln:nnRftx12J4JMHF+9OpMYx
              MD5:332C5D56E41E89F756409E9928CCE842
              SHA1:77D6C46D9E338009434475E0484BDA45CCD4C68E
              SHA-256:4708F3DC2D98AA9557914C6FE25037EA8905A15386E691DA7F308300D484F8B4
              SHA-512:ABAD213FC92B9FF2FEC7DE5B00E929AFACD53CCB67C247F468A19886D71F46479C69F20DFF9C3C2332303FFE87A42F6650A57F74240B11D1D8E33E90DF430328
              Malicious:false
              Preview:regfi...i...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm*.|.................................................................................................................................................................................................................................................................................................................................................nu.HvLE.>......i............Y.B.....?~&.S.........0..............hbin................p.\..,..........nk,.B..........h........................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .B.......... ........................... .......Z.......................Root........lf......Root....nk .B.......................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):8192
              Entropy (8bit):1.8901133238212449
              Encrypted:false
              SSDEEP:48:MHVpQpYdACQmtC3SS3eX5/cwlApldplCPjD04zISw7:M/Qp6tYC0QALdLq/zID7
              MD5:07C1D30D461F911D00EAB61BAEDEC7A4
              SHA1:F895197DF7121C4FB6185A0E19E820F6FBB3245E
              SHA-256:B3991144548297A10D1CE3BD640AB93ABA3AF14A929D1D8CA35C54322C662FE5
              SHA-512:C9F0717C1802CD2BF7DC34048AB59546037A4484EBCEC817E7FFC9E1F0A65513EFE361BA0C50469E2E20BA99883530925C46A0630BAB642E71A4830ABBC620BB
              Malicious:false
              Preview:regf........x.~.................... ...........C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...t.m.p...{.............-.{.............-.....|.............-.rmtmB...................................................................................................................................................................................................................................................................................................................................................1.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\SysWOW64\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):8192
              Entropy (8bit):1.9248402296749032
              Encrypted:false
              SSDEEP:48:6HVdmpYdACQmtC3SS3eX5/cwlApldplCPjD04zISw7:6bmp6tYC0QALdLq/zID7
              MD5:EC0BCF0F5912437E0DC406A1C3571CB5
              SHA1:92607DE8A39F3FF3D895D3F55217A5046636A5C1
              SHA-256:CA3E08C85620B6C991DCA8F2E9472664A9A2F833BAAD2169DBE62680F202360A
              SHA-512:65637248FF26BE3BC0DF46E787031D938FE36FA9643E0FC42811B297058BF153BC3D15B2450616E08295E012E2618CEFC7EDA55F9FE63418135D805809ADFE3C
              Malicious:false
              Preview:regf........x.~.................... ...........C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...t.m.p...{.............-.{.............-.....|.............-.rmtmB...................................................................................................................................................................................................................................................................................................................................................1.HvLE....................`...j.....h+...........hbin................x.~............nk,.B..........h...........0...........................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}......sk..............(.................................................................................8......................1.?l.cL<.P...b....~z...........8......................1.?l.cL<.P...b....~z.............?...................?...................?........... ... ........... ...
              File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
              Entropy (8bit):6.606178271521399
              TrID:
              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
              • Generic Win/DOS Executable (2004/3) 0.20%
              • DOS Executable Generic (2002/1) 0.20%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:050_qbot.dll
              File size:742838
              MD5:bc4aed05e70290533ba126546e0989b0
              SHA1:c148fe036e3aa6a4dc5ce98b323cd8d76d978ac6
              SHA256:5ee244bbdd69f41b1df8e3736e09114603ee7d5e7520cae52424ed18642ca265
              SHA512:666c4642a277f7456de0e04432c693bdf65db5182bdcf91e56643b900b24ec2c6e71f66bdb02a69e8e7b530200890955c7cd4556ba257968a6c88c239f4b4735
              SSDEEP:12288:zDxy+2MIBYYimb3oG11xfTUUk0uU7/GQ4vbnWj68N:Pg+2MIBYkb4G11hTQ05bGM
              TLSH:A4F43B83A6826C92DBE61435CD9ED33667347A5C83F3DBB3F514A9E27D631A33944208
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^.WW.2..C......!.....L..........p........`.....j............>............ .......4........ ......................0..S..
              Icon Hash:7ae282899bbab082
              Entrypoint:0x6ad81470
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x6ad80000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
              DLL Characteristics:
              Time Stamp:0x5757085E [Tue Jun 7 17:46:06 2016 UTC]
              TLS Callbacks:0x6adc4bf0, 0x6adc4ba0
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:1cba0e23b706e0bfbc0a4cb9b6bd80fb
              Signature Valid:
              Signature Issuer:
              Signature Validation Error:
              Error Number:
              Not Before, Not After
                Subject Chain
                  Version:
                  Thumbprint MD5:
                  Thumbprint SHA-1:
                  Thumbprint SHA-256:
                  Serial:
                  Instruction
                  sub esp, 1Ch
                  mov edx, dword ptr [esp+24h]
                  mov dword ptr [6ADF2030h], 00000000h
                  cmp edx, 01h
                  je 00007F1A4075490Ch
                  mov ecx, dword ptr [esp+28h]
                  mov eax, dword ptr [esp+20h]
                  call 00007F1A40754702h
                  add esp, 1Ch
                  retn 000Ch
                  lea esi, dword ptr [esi+00000000h]
                  mov dword ptr [esp+0Ch], edx
                  call 00007F1A407986ECh
                  mov edx, dword ptr [esp+0Ch]
                  jmp 00007F1A407548C9h
                  nop
                  push ebp
                  mov ebp, esp
                  push esi
                  push ebx
                  sub esp, 10h
                  mov ebx, dword ptr [6ADF4124h]
                  mov dword ptr [esp], 6ADC7000h
                  call ebx
                  mov esi, eax
                  sub esp, 04h
                  test esi, esi
                  mov eax, 00000000h
                  je 00007F1A4075491Bh
                  mov dword ptr [esp], 6ADC7000h
                  call dword ptr [6ADF4144h]
                  sub esp, 04h
                  mov dword ptr [6ADF201Ch], eax
                  mov dword ptr [esp+04h], 6ADC7013h
                  mov dword ptr [esp], esi
                  call dword ptr [6ADF4128h]
                  sub esp, 08h
                  test eax, eax
                  je 00007F1A40754903h
                  mov dword ptr [esp+04h], 6ADF2004h
                  mov dword ptr [esp], 6ADEC000h
                  call eax
                  mov eax, dword ptr [6ADC6020h]
                  test eax, eax
                  je 00007F1A4075492Ah
                  mov dword ptr [esp], 6ADC7029h
                  call ebx
                  mov edx, 00000000h
                  sub esp, 04h
                  test eax, eax
                  je 00007F1A40754908h
                  mov dword ptr [esp+04h], 00DC7037h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x730000xc53.edata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x740000x5a4.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x8df100x1cc8/55
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x1790.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x760000x18.tls
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x741080xcc.idata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x44ad40x44c00False0.4085191761363636data6.536085286601772IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x460000x240x200False0.068359375data0.444378072732298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rdata0x470000x240c40x24200False0.042259137110726645data2.965728380228879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  /40x6c0000x59540x5a00False0.266796875data4.8715558095609435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  .bss0x720000x3e40x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .edata0x730000xc530xe00False0.41322544642857145data4.9102030514161354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  .idata0x740000x5a40x600False0.42578125data4.85888040741761IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .CRT0x750000x2c0x200False0.0546875data0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .tls0x760000x200x200False0.052734375data0.28655982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .reloc0x770000x17900x1800False0.8084309895833334data6.600381492361927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /140x790000x380x200False0.068359375Matlab v4 mat-file (little endian) *, rows 2, columns 2621440.23653878450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /290x7a0000xba40xc00False0.4329427083333333data5.509643399768958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /410x7b0000x870x200False0.2265625data1.630440230936631IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /550x7c0000x24f4d0x25000False0.9180215371621622data7.808486707251028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /670xa10000x380x200False0.1171875data0.6947581054952565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  DLLImport
                  KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, InterlockedCompareExchange, InterlockedExchange, LeaveCriticalSection, LoadLibraryA, QueryPerformanceCounter, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualProtect, VirtualQuery
                  msvcrt.dll__dllonexit, _amsg_exit, _initterm, _iob, _lock, _onexit, _unlock, abort, calloc, exit, ferror, fflush, fprintf, fread, free, fwrite, getenv, malloc, memcpy, memset, sprintf, sscanf, strlen, strncmp, vfprintf
                  NameOrdinalAddress
                  lcopy_block_row10x6adade90
                  lcopy_sample_rows20x6adade30
                  ldiv_round_up30x6adaddf0
                  linit_1pass_quantizer40x6adabf70
                  linit_2pass_quantizer50x6adadc70
                  linit_c_coef_controller60x6ad82a40
                  linit_c_main_controller70x6ad8c450
                  linit_c_master_control80x6ad8f7f0
                  linit_c_prep_controller90x6ad933c0
                  linit_color_converter100x6ad83cf0
                  linit_color_deconverter110x6ad9a0e0
                  linit_compress_master120x6ad8c240
                  linit_d_coef_controller130x6ad97f90
                  linit_d_main_controller140x6ad9d790
                  linit_d_post_controller150x6ada4f10
                  linit_downsampler160x6ad93f00
                  linit_forward_dct170x6ad84840
                  linit_huff_decoder180x6ad9c280
                  linit_huff_encoder190x6ad8c190
                  linit_input_controller200x6ad9d100
                  linit_inverse_dct210x6ad9a8b0
                  linit_marker_reader220x6ad9fd60
                  linit_marker_writer230x6ad8e8a0
                  linit_master_decompress240x6ada0a60
                  linit_memory_mgr250x6adaf3e0
                  linit_merged_upsampler260x6ada3760
                  linit_phuff_decoder270x6ada4af0
                  linit_phuff_encoder280x6ad92de0
                  linit_upsampler290x6ada55e0
                  lpeg_CreateCompress300x6ad815b0
                  lpeg_CreateDecompress310x6ad94f40
                  lpeg_abort320x6ad8fb40
                  lpeg_abort_compress330x6ad81730
                  lpeg_abort_decompress340x6ad95150
                  lpeg_add_quant_table350x6ad8fc20
                  lpeg_alloc_huff_table360x6ad8fbf0
                  lpeg_alloc_quant_table370x6ad8fbc0
                  lpeg_calc_output_dimensions380x6ada0270
                  lpeg_consume_input390x6ad95430
                  lpeg_copy_critical_parameters400x6ad94c60
                  lpeg_crop_scanline1050x6ad95bb0
                  lpeg_default_colorspace410x6ad8fe60
                  lpeg_destroy420x6ad8fb90
                  lpeg_destroy_compress430x6ad81720
                  lpeg_destroy_decompress440x6ad95140
                  lpeg_fdct_float450x6ada5ce0
                  lpeg_fdct_ifast460x6ada5ec0
                  lpeg_fdct_islow470x6ada60e0
                  lpeg_fill_bit_buffer480x6ad9b0a0
                  lpeg_finish_compress490x6ad817f0
                  lpeg_finish_decompress500x6ad95740
                  lpeg_finish_output510x6ad963f0
                  lpeg_free_large520x6adaf570
                  lpeg_free_small530x6adaf550
                  lpeg_gen_optimal_table540x6ad8bcf0
                  lpeg_get_large550x6adaf560
                  lpeg_get_small560x6adaf540
                  lpeg_has_multiple_scans570x6ad95700
                  lpeg_huff_decode580x6ad9b1e0
                  lpeg_idct_1x1590x6adab430
                  lpeg_idct_2x2600x6adab130
                  lpeg_idct_4x4610x6adaace0
                  lpeg_idct_float620x6ada6380
                  lpeg_idct_ifast630x6ada6880
                  lpeg_idct_islow640x6ada6ea0
                  lpeg_input_complete650x6ad956c0
                  lpeg_make_c_derived_tbl660x6ad8b7a0
                  lpeg_make_d_derived_tbl670x6ad9ac10
                  lpeg_mem_available680x6adaf580
                  lpeg_mem_dest1020x6ad966f0
                  lpeg_mem_init690x6adaf5b0
                  lpeg_mem_src1030x6ad969e0
                  lpeg_mem_term700x6adaf5c0
                  lpeg_new_colormap710x6ada09f0
                  lpeg_open_backing_store720x6adaf590
                  lpeg_quality_scaling730x6ad8fda0
                  lpeg_read_coefficients740x6ada58d0
                  lpeg_read_header750x6ad95160
                  lpeg_read_raw_data760x6ad962c0
                  lpeg_read_scanlines770x6ad95d90
                  lpeg_resync_to_restart780x6ad9fc20
                  lpeg_save_markers790x6ad9fed0
                  lpeg_set_colorspace800x6ad90910
                  lpeg_set_defaults810x6ad902a0
                  lpeg_set_linear_quality820x6ad8fd40
                  lpeg_set_marker_processor830x6ad9ffb0
                  lpeg_set_quality840x6ad8fdd0
                  lpeg_simple_progression850x6ad90d50
                  lpeg_skip_scanlines1040x6ad95e30
                  lpeg_start_compress860x6ad81a50
                  lpeg_start_decompress870x6ad95ad0
                  lpeg_start_output880x6ad96380
                  lpeg_std_error890x6ada5c70
                  lpeg_stdio_dest900x6ad96680
                  lpeg_stdio_src910x6ad96930
                  lpeg_suppress_tables920x6ad81740
                  lpeg_write_coefficients930x6ad94ae0
                  lpeg_write_m_byte940x6ad819e0
                  lpeg_write_m_header950x6ad81980
                  lpeg_write_marker960x6ad818f0
                  lpeg_write_raw_data970x6ad81bb0
                  lpeg_write_scanlines980x6ad81ae0
                  lpeg_write_tables990x6adadeb0
                  lround_up1000x6adade10
                  next1010x6ad819f0
                  No network behavior found

                  Click to jump to process

                  Target ID:0
                  Start time:20:25:40
                  Start date:06/06/2023
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll"
                  Imagebase:0x10a0000
                  File size:126464 bytes
                  MD5 hash:3B4636AE519868037940CA5C4272091B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  Target ID:1
                  Start time:20:25:40
                  Start date:06/06/2023
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff745070000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:20:25:40
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
                  Imagebase:0xb0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:3
                  Start time:20:25:40
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:4
                  Start time:20:25:40
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:8
                  Start time:20:25:41
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 656
                  Imagebase:0x12a0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:9
                  Start time:20:25:41
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 660
                  Imagebase:0x12a0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:10
                  Start time:20:25:43
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
                  Imagebase:0x7ff745070000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:11
                  Start time:20:25:46
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:12
                  Start time:20:25:49
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:13
                  Start time:20:25:49
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:14
                  Start time:20:25:49
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:16
                  Start time:20:25:49
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000010.00000002.387277732.0000000004FC0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000010.00000002.387218469.00000000034AA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                  Target ID:17
                  Start time:20:25:49
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:18
                  Start time:20:25:50
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
                  Imagebase:0x9d0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:20
                  Start time:20:25:50
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 652
                  Imagebase:0x12a0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:21
                  Start time:20:25:50
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 668
                  Imagebase:0x12a0000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  Target ID:22
                  Start time:20:25:53
                  Start date:06/06/2023
                  Path:C:\Windows\SysWOW64\wermgr.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\wermgr.exe
                  Imagebase:0x13c0000
                  File size:191904 bytes
                  MD5 hash:CCF15E662ED5CE77B5FF1A7AAE305233
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language

                  No disassembly