Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Vb1S2HJcnN.dll

Overview

General Information

Sample name:Vb1S2HJcnN.dll
renamed because original name is a hash value
Original sample name:bd61c244153364c6322a4bc9337d15dcf9c3bf00.dll
Analysis ID:1558403
MD5:8b46c170f7f8a38a8f69fa4bc2b53d61
SHA1:bd61c244153364c6322a4bc9337d15dcf9c3bf00
SHA256:27f8d7bbfe91b1ef754a445fbccc24c9da11695ca63c44a33fa12a1df338b76f
Tags:dlluser-NDA0E
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Creates an autostart registry key pointing to binary in C:\Windows
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
PE file has a writeable .text section
Queries disk data (e.g. SMART data)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to communicate with device drivers
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries information about the installed CPU (vendor, model number etc)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7260 cmdline: loaddll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7312 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7336 cmdline: rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • cmd.exe (PID: 7372 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • PING.EXE (PID: 7424 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
    • rundll32.exe (PID: 7320 cmdline: rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,DoAddToFavDlg MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7512 cmdline: rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,InputFile MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7540 cmdline: rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,PrintFile MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7612 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 676 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7700 cmdline: rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg MD5: 889B99C52A60DD49227C5E485A016679)
      • cmd.exe (PID: 7740 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 7832 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
    • rundll32.exe (PID: 7708 cmdline: rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",InputFile MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7716 cmdline: rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",PrintFile MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7840 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 668 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • rundll32.exe (PID: 3512 cmdline: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg MD5: 889B99C52A60DD49227C5E485A016679)
    • cmd.exe (PID: 3168 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 6660 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • rundll32.exe (PID: 7292 cmdline: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg MD5: 889B99C52A60DD49227C5E485A016679)
    • cmd.exe (PID: 7776 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 7700 cmdline: ping 127.0.0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Vb1S2HJcnN.dllWinnti_NlaifSvcWinnti sample - file NlaifSvc.dllFlorian Roth
  • 0x3b77e:$x1: cracked by ximo
  • 0x3b838:$x1: cracked by ximo
  • 0x3b8f2:$x1: cracked by ximo
  • 0x3b9ac:$x1: cracked by ximo
  • 0x3ba66:$x1: cracked by ximo
  • 0x3bb20:$x1: cracked by ximo
  • 0x3bbda:$x1: cracked by ximo
  • 0x3bc94:$x1: cracked by ximo
  • 0x402d6:$x1: cracked by ximo
  • 0x43d1b:$x1: cracked by ximo
SourceRuleDescriptionAuthorStrings
3.2.rundll32.exe.10000000.0.unpackWinnti_NlaifSvcWinnti sample - file NlaifSvc.dllFlorian Roth
  • 0x3b77e:$x1: cracked by ximo
  • 0x3b838:$x1: cracked by ximo
  • 0x3b8f2:$x1: cracked by ximo
  • 0x3b9ac:$x1: cracked by ximo
  • 0x3ba66:$x1: cracked by ximo
  • 0x3bb20:$x1: cracked by ximo
  • 0x3bbda:$x1: cracked by ximo
  • 0x3bc94:$x1: cracked by ximo
  • 0x402d6:$x1: cracked by ximo
  • 0x43d1b:$x1: cracked by ximo
9.2.rundll32.exe.10000000.0.unpackWinnti_NlaifSvcWinnti sample - file NlaifSvc.dllFlorian Roth
  • 0x3b77e:$x1: cracked by ximo
  • 0x3b838:$x1: cracked by ximo
  • 0x3b8f2:$x1: cracked by ximo
  • 0x3b9ac:$x1: cracked by ximo
  • 0x3ba66:$x1: cracked by ximo
  • 0x3bb20:$x1: cracked by ximo
  • 0x3bbda:$x1: cracked by ximo
  • 0x3bc94:$x1: cracked by ximo
  • 0x402d6:$x1: cracked by ximo
  • 0x43d1b:$x1: cracked by ximo
15.2.rundll32.exe.10000000.0.unpackWinnti_NlaifSvcWinnti sample - file NlaifSvc.dllFlorian Roth
  • 0x3b77e:$x1: cracked by ximo
  • 0x3b838:$x1: cracked by ximo
  • 0x3b8f2:$x1: cracked by ximo
  • 0x3b9ac:$x1: cracked by ximo
  • 0x3ba66:$x1: cracked by ximo
  • 0x3bb20:$x1: cracked by ximo
  • 0x3bbda:$x1: cracked by ximo
  • 0x3bc94:$x1: cracked by ximo
  • 0x402d6:$x1: cracked by ximo
  • 0x43d1b:$x1: cracked by ximo

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 7320, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dtfd
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Vb1S2HJcnN.dllAvira: detected
Source: Vb1S2HJcnN.dllReversingLabs: Detection: 78%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: Vb1S2HJcnN.dllJoe Sandbox ML: detected
Source: Vb1S2HJcnN.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: Binary string: c:\Documents and Settings\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*.*,G source: rundll32.exe, 00000003.00000003.3819763452.00000000030A5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: XE~1INetsettntkrnlmp.pdb source: rundll32.exe, 00000003.00000003.3819763452.0000000003060000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\c:\Documents and Settings\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\*.*[g/D source: rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\Documents and Settings\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\*.**Ja\F source: rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10007F3E FindFirstFileA,FindNextFileA,Sleep,FindClose,3_2_10007F3E
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 202.108.0.52 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.110 18530Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.160.131.253 18659Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.160.131.254 23588Jump to behavior
Source: global trafficTCP traffic: 107.163.56.110 ports 18530,0,1,3,5,8
Source: global trafficTCP traffic: 107.160.131.253 ports 1,5,6,8,9,18659
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: global trafficTCP traffic: 192.168.2.4:49740 -> 107.163.56.110:18530
Source: global trafficTCP traffic: 192.168.2.4:49741 -> 107.160.131.253:18659
Source: global trafficTCP traffic: 192.168.2.4:49764 -> 107.160.131.254:23588
Source: Joe Sandbox ViewASN Name: TAKE2US TAKE2US
Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
Source: global trafficTCP traffic: 192.168.2.4:49790 -> 202.108.0.52:80
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.253
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.253
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.253
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.253
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.253
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: unknownTCP traffic detected without corresponding DNS query: 107.160.131.254
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10003F41 InternetReadFile,3_2_10003F41
Source: global trafficDNS traffic detected: DNS query: host123.zz.am
Source: global trafficDNS traffic detected: DNS query: blog.sina.com.cn
Source: rundll32.exe, rundll32.exe, 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000009.00000002.3051247387.0000000010012000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.4014509182.0000000010012000.00000040.00000001.01000000.00000003.sdmp, Vb1S2HJcnN.dllString found in binary or memory: http://107.160.131.253:18659/
Source: rundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.000000000303C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.253:18659//joy.asp?sid=rungnejcrueXntG4Fe5vteX8v2LUicbtudb8mtiWmtaWndm
Source: rundll32.exe, 00000003.00000002.4158353206.0000000000B0B000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.253:8659//joy.asp?sid=run
Source: rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.3051247387.0000000010012000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.4014509182.0000000010012000.00000040.00000001.01000000.00000003.sdmp, Vb1S2HJcnN.dllString found in binary or memory: http://107.160.131.254:23588/article.php
Source: rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.php$a
Source: rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.php.
Source: rundll32.exe, 00000003.00000002.4158555194.000000000304E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.php3/
Source: rundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.php79
Source: rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.php8f
Source: rundll32.exe, 00000003.00000002.4160815097.0000000005BED000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4161007369.0000000005E0A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpC:
Source: rundll32.exe, 00000003.00000002.4160815097.0000000005BED000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpD
Source: rundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205339890.00000000030B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpGe
Source: rundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpIe
Source: rundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205339890.00000000030B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpUe8E
Source: rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpX
Source: rundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205339890.00000000030B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpdeIE
Source: rundll32.exe, 00000003.00000003.3819763452.0000000003060000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpindows
Source: rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpk
Source: rundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.00000000030A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpme
Source: rundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926096483.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.160.131.254:23588/article.phpreWE
Source: rundll32.exe, 00000003.00000002.4160751686.0000000005B6D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.160.13I
Source: rundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.110:18530/u1129.html
Source: rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.110:18530/u1129.htmlH
Source: rundll32.exe, 00000003.00000002.4159289964.0000000004D41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/%s
Source: rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093
Source: rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093#V
Source: rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093.
Source: rundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/57624790935V
Source: rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093V
Source: rundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093eV
Source: rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093oV
Source: rundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093wV
Source: rundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.00000000030A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093z
Source: rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093z6
Source: rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093ziV
Source: rundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093zoV
Source: rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093zwV
Source: rundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093zz
Source: Amcache.hve.12.drString found in binary or memory: http://upx.sf.net
Source: rundll32.exe, rundll32.exe, 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000009.00000002.3051316180.000000001003D000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.4014701747.000000001003D000.00000040.00000001.01000000.00000003.sdmp, Vb1S2HJcnN.dllString found in binary or memory: http://www.rsac.org/ratingsv01.html

System Summary

barindex
Source: Vb1S2HJcnN.dll, type: SAMPLEMatched rule: Winnti sample - file NlaifSvc.dll Author: Florian Roth
Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti sample - file NlaifSvc.dll Author: Florian Roth
Source: 9.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti sample - file NlaifSvc.dll Author: Florian Roth
Source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti sample - file NlaifSvc.dll Author: Florian Roth
Source: Vb1S2HJcnN.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 49%
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10008AAD: DeviceIoControl,3_2_10008AAD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10003F63 ExitWindowsEx,3_2_10003F63
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B2243_2_1000B224
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B70D3_2_1000B70D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100121ED3_2_100121ED
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000AEC03_2_1000AEC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10001000 appears 305 times
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 676
Source: Vb1S2HJcnN.dllBinary or memory string: OriginalFilenamejscript.dllL vs Vb1S2HJcnN.dll
Source: Vb1S2HJcnN.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: Vb1S2HJcnN.dll, type: SAMPLEMatched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 9.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Winnti_NlaifSvc date = 2017-01-25, hash1 = 964f9bfd52b5a93179b90d21705cd0c31461f54d51c56d558806fe0efff264e5, author = Florian Roth, description = Winnti sample - file NlaifSvc.dll, reference = https://goo.gl/VbvJtL, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: Vb1S2HJcnN.dllStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: classification engineClassification label: mal100.troj.spyw.evad.winDLL@42/10@49/5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000404F AdjustTokenPrivileges,3_2_1000404F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10003FB7 CreateToolhelp32Snapshot,3_2_10003FB7
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\12010043Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1216:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7268:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7876:120:WilError_03
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\host123.zz.am:6658
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7540
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Mhost123.zz.am:6658
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\0x5d65r455f
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7716
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7380:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c58b50b8-c5e7-4c01-bba8-4d0b9a13af14Jump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,DoAddToFavDlg
Source: Vb1S2HJcnN.dllReversingLabs: Detection: 78%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,DoAddToFavDlg
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,InputFile
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,PrintFile
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 676
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",InputFile
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",PrintFile
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 668
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,DoAddToFavDlgJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,InputFileJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,PrintFileJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlgJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",InputFileJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",PrintFileJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: mfc42.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp60.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: avicap32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dll
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dll
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dll
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dll
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dll
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dll
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Binary string: c:\Documents and Settings\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\*.*,G source: rundll32.exe, 00000003.00000003.3819763452.00000000030A5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: XE~1INetsettntkrnlmp.pdb source: rundll32.exe, 00000003.00000003.3819763452.0000000003060000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\c:\Documents and Settings\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\*.*[g/D source: rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\Documents and Settings\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\*.**Ja\F source: rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003900A push dword ptr [esp+4Ch]; retn 0050h3_2_1003901C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10027023 push dword ptr [esp+18h]; retn 001Ch3_2_1002A254
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F024 push dword ptr [esp+14h]; retn 0018h3_2_1002F036
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10029029 push dword ptr [esp+38h]; retn 003Ch3_2_10027C71
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10029029 pushad ; mov dword ptr [esp], 73E57D1Ah3_2_10029046
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003B02D push dword ptr [esp+50h]; retn 0054h3_2_1003B061
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F039 push esp; mov dword ptr [esp], B1CF2C6Dh3_2_1002F051
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F039 push dword ptr [esp+50h]; retn 0054h3_2_1002F068
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035048 push dword ptr [esp+50h]; retn 0054h3_2_100351D7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10033059 push dword ptr [esp+50h]; retn 0054h3_2_1003307F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10033064 push dword ptr [esp+50h]; retn 0054h3_2_1003307F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002D06D push dword ptr [esp+38h]; retn 003Ch3_2_1002D08D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10031079 push dword ptr [esp+30h]; retn 0034h3_2_10031095
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10027080 push ebp; mov dword ptr [esp], edx3_2_1002FD0B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10027080 push dword ptr [esp+04h]; retn 0008h3_2_1002FD4E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10023085 push dword ptr [esp+38h]; retn 003Ch3_2_10023093
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10023096 push dword ptr [esp+50h]; retn 0054h3_2_100230B3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100330A5 push dword ptr [esp+2Ch]; retn 0030h3_2_1002B78C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100330A5 push dword ptr [esp+04h]; retn 0008h3_2_1003B2DF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100230B6 push dword ptr [esp+34h]; retn 0038h3_2_1002F874
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100270BA push dword ptr [esp+34h]; retn 0038h3_2_1002AD33
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100250BC push dword ptr [esp+44h]; retn 0048h3_2_1003408E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F0D4 push dword ptr [esp+0Ch]; retn 0014h3_2_1002F0EF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100270D4 push dword ptr [esp+0Ch]; retn 0010h3_2_100282E3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100270D4 push dword ptr [esp+0Ch]; retn 0010h3_2_100338DA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100350D9 push dword ptr [esp+50h]; retn 0054h3_2_10035102
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100250D9 push dword ptr [esp+14h]; retn 0018h3_2_100250F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002B0E4 push dword ptr [esp+48h]; retn 004Ch3_2_1002B0FD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002D0EF push dword ptr [esp+10h]; retn 0014h3_2_1002D116
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002B0EF push dword ptr [esp+48h]; retn 004Ch3_2_1002B0FD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10039107 push dword ptr [esp+4Ch]; retn 0050h3_2_10039116

Boot Survival

barindex
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dtfdJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dtfdJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dtfdJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_3-17249
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001E1FE rdtsc 3_2_1001E1FE
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 300000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 3600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 383Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 5667Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7488Thread sleep count: 383 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7488Thread sleep time: -689400000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8052Thread sleep time: -140000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7324Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8156Thread sleep time: -4200000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8160Thread sleep time: -3000000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3448Thread sleep time: -1440000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4500Thread sleep time: -1200000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7440Thread sleep time: -1800000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8056Thread sleep time: -7200000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7488Thread sleep count: 5667 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7488Thread sleep time: -10200600000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7324Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10007F3E FindFirstFileA,FindNextFileA,Sleep,FindClose,3_2_10007F3E
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 300000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 3600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
Source: rundll32.exe, 00000003.00000002.4158300734.0000000000ACB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: s\Applications\\VMwareHoh
Source: Amcache.hve.12.drBinary or memory string: VMware
Source: Amcache.hve.12.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.12.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.12.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.12.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.12.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.12.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: rundll32.exe, 00000003.00000002.4158555194.000000000304E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.12.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.12.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.12.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.12.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.12.drBinary or memory string: vmci.sys
Source: Amcache.hve.12.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: rundll32.exe, 00000003.00000003.1996338215.0000000002EF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: y\Machine\Software\Classes\Applications\\VMwareHostOpen.exes\Applications\\VMwareHostOpen.exeion\\Run\User Shell Foldersockdown_Zones\4
Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.12.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.12.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.12.drBinary or memory string: VMware20,1
Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.12.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.12.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: rundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ons\\VMwareHostO
Source: Amcache.hve.12.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.12.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.12.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.12.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.12.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.12.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: rundll32.exe, 00000003.00000002.4159289964.0000000004CBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Applications\\VMwareHostOpen.exe
Source: rundll32.exe, 00000003.00000002.4158486871.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RE\DESCRIPTION\System\CentralProcessor\0xes\Applications\\VMwareHostOpen.exeion\\Run\User Shell Foldersockdown_Zones\45
Source: Amcache.hve.12.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001E1FE rdtsc 3_2_1001E1FE

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 202.108.0.52 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.110 18530Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.160.131.253 18659Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.160.131.254 23588Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.12.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.12.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.12.drBinary or memory string: MsMpEng.exe

Stealing of Sensitive Information

barindex
Source: C:\Windows\SysWOW64\rundll32.exeDevice IO: \Device\Harddisk0\DR0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDevice IO: \Device\Harddisk0\DR0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDevice IO: \Device\Harddisk0\DR0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDevice IO: \Device\Harddisk0\DR0Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
11
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping31
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
111
Process Injection
31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Registry Run Keys / Startup Folder
1
Access Token Manipulation
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
111
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Remote System Discovery
SSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Rundll32
DCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem111
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1558403 Sample: Vb1S2HJcnN.dll Startdate: 19/11/2024 Architecture: WINDOWS Score: 100 59 host123.zz.am 2->59 61 blogx.sina.com.cn 2->61 63 blog.sina.com.cn 2->63 85 Malicious sample detected (through community Yara rule) 2->85 87 Antivirus / Scanner detection for submitted sample 2->87 89 Multi AV Scanner detection for submitted file 2->89 91 4 other signatures 2->91 10 loaddll32.exe 1 2->10         started        12 rundll32.exe 2->12         started        14 rundll32.exe 2->14         started        signatures3 process4 process5 16 cmd.exe 1 10->16         started        19 rundll32.exe 1 14 10->19         started        22 rundll32.exe 10->22         started        28 5 other processes 10->28 24 cmd.exe 12->24         started        26 cmd.exe 14->26         started        dnsIp6 73 Uses ping.exe to sleep 16->73 75 Uses ping.exe to check the status of other devices and networks 16->75 30 rundll32.exe 16->30         started        65 107.163.56.110, 18530 TAKE2US United States 19->65 67 107.160.131.253, 18659 AS40676US United States 19->67 69 2 other IPs or domains 19->69 77 System process connects to network (likely due to code injection or exploit) 19->77 79 Found evasive API chain (may stop execution after checking mutex) 19->79 81 Creates an autostart registry key pointing to binary in C:\Windows 19->81 83 Queries disk data (e.g. SMART data) 22->83 33 cmd.exe 22->33         started        35 conhost.exe 24->35         started        37 PING.EXE 24->37         started        39 conhost.exe 26->39         started        41 PING.EXE 26->41         started        43 WerFault.exe 22 16 28->43         started        45 WerFault.exe 28->45         started        signatures7 process8 signatures9 93 Queries disk data (e.g. SMART data) 30->93 47 cmd.exe 1 30->47         started        95 Uses ping.exe to sleep 33->95 50 conhost.exe 33->50         started        52 PING.EXE 1 33->52         started        process10 signatures11 97 Uses ping.exe to sleep 47->97 54 PING.EXE 1 47->54         started        57 conhost.exe 47->57         started        process12 dnsIp13 71 127.0.0.1 unknown unknown 54->71

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Vb1S2HJcnN.dll79%ReversingLabsWin32.Backdoor.Farfli
Vb1S2HJcnN.dll100%AviraTR/Crypt.PEPM.Gen
Vb1S2HJcnN.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://107.160.131.254:23588/article.phpC:0%Avira URL Cloudsafe
http://107.160.131.253:8659//joy.asp?sid=run0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpindows0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpD0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.php790%Avira URL Cloudsafe
http://107.160.131.254:23588/article.php0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpme0%Avira URL Cloudsafe
http://107.163.56.110:18530/u1129.html0%Avira URL Cloudsafe
http://107.160.131.253:18659//joy.asp?sid=rungnejcrueXntG4Fe5vteX8v2LUicbtudb8mtiWmtaWndm0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.php3/0%Avira URL Cloudsafe
http://107.163.56.110:18530/u1129.htmlH0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpdeIE0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.php.0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpUe8E0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.php$a0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpIe0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpk0%Avira URL Cloudsafe
http://www.rsac.org/ratingsv01.html0%Avira URL Cloudsafe
http://107.160.131.253:18659/0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.php8f0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpreWE0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpGe0%Avira URL Cloudsafe
http://107.160.13I0%Avira URL Cloudsafe
http://107.160.131.254:23588/article.phpX0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
blogx.sina.com.cn
202.108.0.52
truefalse
    high
    host123.zz.am
    unknown
    unknownfalse
      unknown
      blog.sina.com.cn
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://107.160.131.254:23588/article.phprundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.3051247387.0000000010012000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.4014509182.0000000010012000.00000040.00000001.01000000.00000003.sdmp, Vb1S2HJcnN.dllfalse
        • Avira URL Cloud: safe
        unknown
        http://blog.sina.com.cn/u/5762479093.rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://107.160.131.254:23588/article.php3/rundll32.exe, 00000003.00000002.4158555194.000000000304E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.160.131.254:23588/article.phpindowsrundll32.exe, 00000003.00000003.3819763452.0000000003060000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.160.131.254:23588/article.phpmerundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.00000000030A5000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.160.131.254:23588/article.phpC:rundll32.exe, 00000003.00000002.4160815097.0000000005BED000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4161007369.0000000005E0A000.00000004.00000010.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.160.131.254:23588/article.phpDrundll32.exe, 00000003.00000002.4160815097.0000000005BED000.00000004.00000010.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.110:18530/u1129.htmlrundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.160.131.254:23588/article.php79rundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://upx.sf.netAmcache.hve.12.drfalse
            high
            http://107.160.131.253:18659//joy.asp?sid=rungnejcrueXntG4Fe5vteX8v2LUicbtudb8mtiWmtaWndmrundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.000000000303C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://107.160.131.253:8659//joy.asp?sid=runrundll32.exe, 00000003.00000002.4158353206.0000000000B0B000.00000004.00000010.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://blog.sina.com.cn/u/%srundll32.exe, 00000003.00000002.4159289964.0000000004D41000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://blog.sina.com.cn/u/5762479093rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://107.163.56.110:18530/u1129.htmlHrundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://107.160.131.254:23588/article.phpdeIErundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205339890.00000000030B1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://blog.sina.com.cn/u/5762479093eVrundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://blog.sina.com.cn/u/5762479093#Vrundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://blog.sina.com.cn/u/5762479093z6rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://107.160.131.254:23588/article.php.rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://107.160.131.254:23588/article.phpUe8Erundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205339890.00000000030B1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://blog.sina.com.cn/u/5762479093wVrundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://107.160.131.254:23588/article.phpkrundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://107.160.131.254:23588/article.php8frundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://107.160.131.254:23588/article.php$arundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://blog.sina.com.cn/u/5762479093Vrundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://107.160.131.254:23588/article.phpIerundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://blog.sina.com.cn/u/5762479093oVrundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://blog.sina.com.cn/u/5762479093zzrundll32.exe, 00000003.00000002.4158555194.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://blog.sina.com.cn/u/57624790935Vrundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.rsac.org/ratingsv01.htmlrundll32.exe, rundll32.exe, 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000009.00000002.3051316180.000000001003D000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.4014701747.000000001003D000.00000040.00000001.01000000.00000003.sdmp, Vb1S2HJcnN.dllfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://107.160.131.253:18659/rundll32.exe, rundll32.exe, 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000009.00000002.3051247387.0000000010012000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.4014509182.0000000010012000.00000040.00000001.01000000.00000003.sdmp, Vb1S2HJcnN.dllfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://107.160.131.254:23588/article.phpreWErundll32.exe, 00000003.00000003.2082760884.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926096483.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2926049501.00000000030A2000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://blog.sina.com.cn/u/5762479093zwVrundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://blog.sina.com.cn/u/5762479093zrundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.0000000003034000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4158555194.00000000030A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://107.160.131.254:23588/article.phpGerundll32.exe, 00000003.00000003.2205306350.00000000030A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2604915627.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244806937.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2244967550.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2204711938.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2205339890.00000000030B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://blog.sina.com.cn/u/5762479093zoVrundll32.exe, 00000003.00000003.2082760884.000000000309A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2083001265.00000000030A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://107.160.13Irundll32.exe, 00000003.00000002.4160751686.0000000005B6D000.00000004.00000010.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://107.160.131.254:23588/article.phpXrundll32.exe, 00000003.00000003.2364014857.00000000030A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://blog.sina.com.cn/u/5762479093ziVrundll32.exe, 00000003.00000003.3819763452.00000000030AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        202.108.0.52
                                        blogx.sina.com.cnChina
                                        4808CHINA169-BJChinaUnicomBeijingProvinceNetworkCNfalse
                                        107.163.56.110
                                        unknownUnited States
                                        20248TAKE2UStrue
                                        107.160.131.253
                                        unknownUnited States
                                        40676AS40676UStrue
                                        107.160.131.254
                                        unknownUnited States
                                        40676AS40676UStrue
                                        IP
                                        127.0.0.1
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1558403
                                        Start date and time:2024-11-19 13:17:25 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 8m 33s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:33
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:Vb1S2HJcnN.dll
                                        renamed because original name is a hash value
                                        Original Sample Name:bd61c244153364c6322a4bc9337d15dcf9c3bf00.dll
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winDLL@42/10@49/5
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 93%
                                        • Number of executed functions: 28
                                        • Number of non-executed functions: 20
                                        Cookbook Comments:
                                        • Found application associated with file extension: .dll
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 52.168.117.173, 20.42.65.92
                                        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                        • Report size getting too big, too many NtOpenFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: Vb1S2HJcnN.dll
                                        TimeTypeDescription
                                        07:18:20API Interceptor1234473x Sleep call for process: rundll32.exe modified
                                        07:18:27API Interceptor1x Sleep call for process: loaddll32.exe modified
                                        07:20:34API Interceptor2x Sleep call for process: WerFault.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        202.108.0.52VqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                                        • blog.sina.com.cn/u/5655029807
                                        k4F4uRTZZR.dllGet hashmaliciousUnknownBrowse
                                        • blog.sina.com.cn/u/5655029807
                                        5jme4p7u76.exeGet hashmaliciousUnknownBrowse
                                        • blog.sina.com.cn/u/5655029807
                                        107.163.56.11002hNixBIvP.exeGet hashmaliciousUnknownBrowse
                                          abc.dllGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            blogx.sina.com.cnVqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                                            • 202.108.0.52
                                            k4F4uRTZZR.dllGet hashmaliciousUnknownBrowse
                                            • 202.108.0.52
                                            http://zeuso.ccGet hashmaliciousUnknownBrowse
                                            • 202.108.0.52
                                            02hNixBIvP.exeGet hashmaliciousUnknownBrowse
                                            • 202.108.0.52
                                            5jme4p7u76.exeGet hashmaliciousUnknownBrowse
                                            • 202.108.0.52
                                            abc.dllGet hashmaliciousUnknownBrowse
                                            • 123.126.45.92
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AS40676USMalwarebytes Premium v4.6.8.311.exeGet hashmaliciousUnknownBrowse
                                            • 41.216.183.30
                                            Fdoze89ykv.jsGet hashmaliciousMint StealerBrowse
                                            • 45.61.137.33
                                            QKS3UTHFX9.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            5z3Wzl6uag.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            e8HOp8k5Kj.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            Fdoze89ykv.jsGet hashmaliciousMint StealerBrowse
                                            • 45.61.137.33
                                            QKS3UTHFX9.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            5z3Wzl6uag.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            e8HOp8k5Kj.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 45.34.110.251
                                            AS40676USMalwarebytes Premium v4.6.8.311.exeGet hashmaliciousUnknownBrowse
                                            • 41.216.183.30
                                            Fdoze89ykv.jsGet hashmaliciousMint StealerBrowse
                                            • 45.61.137.33
                                            QKS3UTHFX9.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            5z3Wzl6uag.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            e8HOp8k5Kj.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            Fdoze89ykv.jsGet hashmaliciousMint StealerBrowse
                                            • 45.61.137.33
                                            QKS3UTHFX9.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            5z3Wzl6uag.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            e8HOp8k5Kj.jsGet hashmaliciousUnknownBrowse
                                            • 45.61.137.33
                                            xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 45.34.110.251
                                            CHINA169-BJChinaUnicomBeijingProvinceNetworkCNowari.mips.elfGet hashmaliciousUnknownBrowse
                                            • 111.193.177.206
                                            owari.x86.elfGet hashmaliciousUnknownBrowse
                                            • 60.194.199.155
                                            VqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                                            • 202.108.0.52
                                            hmips.elfGet hashmaliciousMiraiBrowse
                                            • 111.196.123.227
                                            botx.m68k.elfGet hashmaliciousMiraiBrowse
                                            • 123.112.202.42
                                            botx.ppc.elfGet hashmaliciousMiraiBrowse
                                            • 113.45.119.194
                                            botx.arm.elfGet hashmaliciousMiraiBrowse
                                            • 211.145.29.8
                                            xd.m68k.elfGet hashmaliciousMiraiBrowse
                                            • 114.117.36.234
                                            xd.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 219.238.44.6
                                            xd.x86.elfGet hashmaliciousMiraiBrowse
                                            • 111.210.169.218
                                            TAKE2USVqCbf9fhnQ.exeGet hashmaliciousUnknownBrowse
                                            • 107.163.43.253
                                            yakuza.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 107.163.215.236
                                            DHL_doc.exeGet hashmaliciousFormBookBrowse
                                            • 107.163.130.253
                                            wODub61gZe.exeGet hashmaliciousFormBookBrowse
                                            • 107.163.130.249
                                            mips.elfGet hashmaliciousMiraiBrowse
                                            • 107.163.25.123
                                            INVOICES.exeGet hashmaliciousFormBookBrowse
                                            • 107.163.130.253
                                            sh4.elfGet hashmaliciousMiraiBrowse
                                            • 23.231.236.168
                                            armv6l.elfGet hashmaliciousUnknownBrowse
                                            • 23.231.236.146
                                            3qsTcL9MOT.exeGet hashmaliciousFormBookBrowse
                                            • 107.163.96.57
                                            ImBm40hNZ2.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                            • 23.231.158.3
                                            No context
                                            No context
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):663
                                            Entropy (8bit):4.501725476842082
                                            Encrypted:false
                                            SSDEEP:6:yFOeCUmBqqdUVNnKz43Ej9wqjHWDnPvX3VUwwwwwwwwwwwwwwwwwwwwM:8lXmBUVNj3Ej9b2DnPv3Vn
                                            MD5:D35633A1A809B5BDEEDA2BCE52057CC0
                                            SHA1:05AE164998FEB5066D34A55565B8F8C2A0D3382F
                                            SHA-256:8BC0117DA67370038B4DAF92978C1F3D78D34C19383FDE791651F3C7F9B719A2
                                            SHA-512:0D32375C9799D3E910908A22580589D66723997CBB00BD8E3E2881D825A42167E9BE861AFCA4C444832CC34423C9651254A0F60B7B9C7FB0A0CC6DA649AC4A46
                                            Malicious:false
                                            Preview:..2024-11-21 09:29..iOffset....2024-11-23 00:10..iOffset....2024-11-23 21:03..iOffset....2024-11-25 17:35..iOffset....2024-11-26 14:28..iOffset....2024-11-28 15:26..iOffset....2024-11-29 19:49..iOffset....2024-12-02 23:25..iOffset....2024-12-07 03:09..iOffset....2024-12-10 06:32..iOffset....2024-12-20 18:37..iOffset....2024-12-31 11:12..iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset........iOffset..
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.9499848688206065
                                            Encrypted:false
                                            SSDEEP:192:ymDiwEOK730BU/wjeTQWaZYzuiFpZ24IO8dci:DDiKuEBU/wjekbYzuiFpY4IO8dci
                                            MD5:868EB3E0B72E3FFC5AA51386A2E86888
                                            SHA1:D6F421225847509204908E50666225350A4E9D31
                                            SHA-256:1D8F7AFAD99313BF78F8ADC057C97D82904B6E1032A6EB6ABBF81DD4829AA5C6
                                            SHA-512:7D400BC4A4A4DD580BA594B35A865A577F5124BB223D3C15443ADEE9DA4C977CD45AB621523D7AADF71202D18A54BFFC60C2C7FE5E8B8D5A5713FDA868A509CF
                                            Malicious:false
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.4.9.2.3.0.7.8.2.9.1.7.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.4.9.2.3.0.8.4.0.7.3.2.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.9.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.e.1.a.c.a.2.-.3.c.d.9.-.4.7.3.d.-.8.1.e.1.-.b.c.7.a.4.6.e.9.e.2.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.8.d.2.f.b.a.-.f.b.f.4.-.4.5.2.8.-.8.0.e.3.-.1.0.a.6.6.0.1.a.a.8.2.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.2.4.-.0.0.0.1.-.0.0.1.4.-.1.0.0.7.-.2.9.2.3.7.d.3.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.9505302083817813
                                            Encrypted:false
                                            SSDEEP:192:0jiigODv0BU/wjeTgWBCYzuiFEZ24IO8dci:6iiRDcBU/wje0LYzuiFEY4IO8dci
                                            MD5:8710DE9D949F44CFBACE66316A027CCE
                                            SHA1:349A2DE90A90939E550369C26246EEEA1776953B
                                            SHA-256:E5A70977BC1E59FA40F1708185E3C92135A64DB9491EDEC37CA19665CCAD3F17
                                            SHA-512:1941227F3464CCAF798C20FB2ED3AA8F0765B3157B545A9B3E84C2E242CBAED653A19C708B4254FBBC644BD4B130FFF523D1B752D8F2B0534140B6B48F345AC6
                                            Malicious:false
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.4.9.2.3.0.4.7.2.1.8.6.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.4.9.2.3.0.5.2.6.8.7.0.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.9.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.6.8.b.b.8.1.7.-.f.6.6.d.-.4.3.6.b.-.8.0.f.0.-.4.3.4.6.d.1.9.0.c.4.a.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.c.7.c.2.8.c.6.-.d.e.f.e.-.4.f.5.f.-.b.2.b.8.-.b.d.f.2.c.a.d.7.a.e.f.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.4.-.0.0.0.1.-.0.0.1.4.-.e.c.3.5.-.5.5.2.1.7.d.3.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Tue Nov 19 12:18:24 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):45628
                                            Entropy (8bit):1.9700671608424365
                                            Encrypted:false
                                            SSDEEP:192:VBm8H5CZ53XUXaZ+O5H4c6tkIWMx3shYO/H3qZmnlE:zm8AZ5zZ55HpkkHMChP/HZlE
                                            MD5:4D49981962E1B6DEA1021BD01E9B1F7B
                                            SHA1:584A5CAC383F4E2F55487D749FBB0D6082D757CD
                                            SHA-256:66A1999B74B9B68218CC32567859040ED8EE2F992EA452D9BD44820E09CB4C88
                                            SHA-512:119DE7DA87B471A8198E86685C358F9722DF8D22539743FF13B07B1728F57382C9F9512F785FBD0CF03450B258422E45EAB5A44BB4DFA7220F07F4CCF4CA55AE
                                            Malicious:false
                                            Preview:MDMP..a..... .........<g........................................V/..........T.......8...........T...............t...........L...........8...............................................................................eJ..............GenuineIntel............T.......t.....<g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8272
                                            Entropy (8bit):3.691640863975639
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJj66Ab6YB+6ZgmfTxhprt89bwMGsfkyqm:R6lXJe6U6Y46ZgmfTxmjlfP
                                            MD5:D2CCA97E02E61CA1CA386D700C5AD8D2
                                            SHA1:D24444A289B57E9A6A08A0F7010D8D25C1A70326
                                            SHA-256:F767F494FB53800D42A3A2BB8B716D93335B78E3BC52B4859F600CF45FFF5C26
                                            SHA-512:4E8EB2C4084C3090BB96C0BE452AC59FF96EBF493A98F3B824D0D15162C78FC14E1B5B8718697ECDA72408F9788F0F3ADE2D461E5C2BDAB16D781085B1426229
                                            Malicious:false
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.4.0.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4654
                                            Entropy (8bit):4.463527919610204
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsOJg77aI98nWpW8VYXYm8M4JCdPOFCm+q8/ACmYGScS1d:uIjfEI7iW7VnJ9amYJ31d
                                            MD5:E6837C5D4927EE86E3783E7B8BC52591
                                            SHA1:8551E5A715476CC1EB16AC2079A3EDB21D9DD04E
                                            SHA-256:BED7362944806F11D5C5DEFD6B0796EB4B0EFAD08700F03491093026AD8F3787
                                            SHA-512:46E8ADB3F430047A5B0660236AFEB6F78201C73292515C333EE0CF55F24487DF11F5FF0DE95708DC0FD73F97E9100C72B8B7FE2DEEFBC9D87E94D6267EE0D03D
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="594921" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Tue Nov 19 12:18:27 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):44430
                                            Entropy (8bit):2.0339553066949794
                                            Encrypted:false
                                            SSDEEP:192:eC8SQZ55XUXapO5H4khc19EqECX/baKGgdaTUl:x8lZ5Js5Hxhc19ElCX/bad4l
                                            MD5:361BC3B49C66CD4FFC65A2F389B6A2CC
                                            SHA1:8102D26B73C7F8227EBCB92271A97840F66EB5C5
                                            SHA-256:ECC6538CC133D22346CB56FC9A97EC362BFCFDAB1441132A7D9671E58A36C877
                                            SHA-512:E119D29161164ECB196832116CD4FD5B3119E78A64EC8F54EB8FF604CFDF18F3EED478F4F837257CB465A24D8E6D2459BA2E54B3470A07F46CEF49117403D083
                                            Malicious:false
                                            Preview:MDMP..a..... .........<g........................................V/..........T.......8...........T..........................L...........8...............................................................................eJ..............GenuineIntel............T.......$.....<g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8266
                                            Entropy (8bit):3.689222136127775
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJSa6E6YZB6YTgmfTZhpr+89bw57sfQMvy5m:R6lXJn6E6Yv6YTgmfTZrGAfQA
                                            MD5:0A72131AC8A073C1AB8289CCCDEC63BC
                                            SHA1:8AA201436DF79EA2C49AC5DEB5982F7763CEB55B
                                            SHA-256:DE238B0F6736A24DCE29149812D7501CF99BA60E44BC09522B29E1C675DA928B
                                            SHA-512:368A9C7C27912B02CEE820746BCAFF9196CD60F4F64E663F8385194081DA3E61D6BB0093127BF1F1679C9A393AFEBD88AD94FFAE150325B8FFAEC23772B60796
                                            Malicious:false
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.1.6.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4654
                                            Entropy (8bit):4.4600591103847975
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsOJg77aI98nWpW8VYUPYm8M4JCdPSFEHP+q8/AJGScSeMd:uIjfEI7iW7VBSJ8vhJ37d
                                            MD5:F35993F586D8B69FA029BEDF7883129F
                                            SHA1:4EA9166B26F2CD442E8B1DF8865B7A77BF4C56ED
                                            SHA-256:11B4FAC16053180554E0298A562BEFED2C6A9756D97923CA3A206988E74DBFA7
                                            SHA-512:50ABD0DE5C765BDF6541F6D16423858B2BCB5113321E01FBC9000937C124760CF94751D7CB2FC5716FD3DBA85240A312102135CA857BF5FB29CA1409DBC89A70
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="594921" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.466249667178544
                                            Encrypted:false
                                            SSDEEP:6144:3IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:4XD94+WlLZMM6YFHT+G
                                            MD5:EE27EB32C479DCD1B9AE00826FA73A31
                                            SHA1:CFCFE1BD743DD686B721D2C725B7CFB238182B09
                                            SHA-256:E330DC8D399F799FC51A1CC62FD96F819CD5B8DADCF50E92A4ECB80A0B9C29EF
                                            SHA-512:FC9AEAE5A48ADB1628AF4D591641295A2D30AF50A2F616061237FABE7CEC3373D2A1111DBFCFB932528B6C2ADFA8AC6EF34B4FA5234F3D4E75669275AB3AFE02
                                            Malicious:false
                                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.w.!}:.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows, PECompact2 compressed
                                            Entropy (8bit):6.394206485804745
                                            TrID:
                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                            • DOS Executable Generic (2002/1) 0.20%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Vb1S2HJcnN.dll
                                            File size:322'801 bytes
                                            MD5:8b46c170f7f8a38a8f69fa4bc2b53d61
                                            SHA1:bd61c244153364c6322a4bc9337d15dcf9c3bf00
                                            SHA256:27f8d7bbfe91b1ef754a445fbccc24c9da11695ca63c44a33fa12a1df338b76f
                                            SHA512:37fbb60a471e58ccab0aefbf530bdb3c674310b1abf7d1966493ff890119d4bcb68fe8d9b21bae13d98842811634dc8fc192801b0a94b91ed62a674477e8dabf
                                            SSDEEP:6144:YutK09bpsWYrPnP3UKLSr1TS8BbdrFucR+z+qagIK+bcgaI0b:BK0YWYrPP35LSrBS8LQ4+z+qagQYVIK
                                            TLSH:4C64AE0237B552F5D4F70A3A9F35E72DE33438109CA8DD159B8A08C91CE394AAED578B
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... B..N...N...N...B...N.F.....N.......N.......N.......N...@...N.m.D...N...O.^.N.m.E...N.=.H...N.m.J...N.Rich..N................
                                            Icon Hash:7ae282899bbab082
                                            Entrypoint:0x10042ae6
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x10000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
                                            DLL Characteristics:
                                            Time Stamp:0x565C7C9C [Mon Nov 30 16:43:08 2015 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:1e14d607956b4cc2b9b7835c72bf0b77
                                            Instruction
                                            jmp 00007F7774EC7F5Eh
                                            adc byte ptr [ebp+6E3FA254h], al
                                            or eax, dword ptr [esi]
                                            mov cl, 92h
                                            Programming Language:
                                            • [IMP] VS2008 SP1 build 30729
                                            • [ C ] VS98 (6.0) build 8168
                                            • [C++] VS98 (6.0) build 8168
                                            • [RES] VS98 (6.0) cvtres build 1720
                                            • [LNK] VS98 (6.0) imp/exp build 8168
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x4fb240x68.rsrc
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3d6cc0x118.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000xb10.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x490000x1628.text
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x4e0000x4ca00b29859f73b90e7f64037da48fbee12a8False0.5888783391109299data6.394873960706557IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x4f0000x20000x1e00a03763a40a39da37762a5efcd57a5136False0.6859375data6.354524003809639IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .reloc0x510000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_STRING0x4b0000x16cdataEnglishUnited States0.5521978021978022
                                            RT_STRING0x4b1700x86dataEnglishUnited States0.6417910447761194
                                            RT_STRING0x4b1f80x56dataEnglishUnited States0.6744186046511628
                                            RT_STRING0x4b2500x16edataEnglishUnited States0.505464480874317
                                            RT_STRING0x4b3c00x128dataEnglishUnited States0.581081081081081
                                            RT_STRING0x4b4e80xd2dataEnglishUnited States0.5761904761904761
                                            RT_STRING0x4b5c00x6adataEnglishUnited States0.660377358490566
                                            RT_STRING0x4b6300xc8Matlab v4 mat-file (little endian) b, numeric, rows 0, columns 0EnglishUnited States0.555
                                            RT_STRING0x4b6f80x200dataEnglishUnited States0.375
                                            RT_STRING0x4b8f80x23edataEnglishUnited States0.44773519163763065
                                            RT_STRING0x4bb380x12edataEnglishUnited States0.4503311258278146
                                            RT_STRING0x4bc680xcaMatlab v4 mat-file (little endian) O, numeric, rows 0, columns 0EnglishUnited States0.42574257425742573
                                            RT_STRING0x4bd380x252dataEnglishUnited States0.39225589225589225
                                            RT_STRING0x4bf900x28edataEnglishUnited States0.43730886850152906
                                            RT_STRING0x4c2200xcedataEnglishUnited States0.4563106796116505
                                            RT_STRING0x4c2f00x15cMatlab v4 mat-file (little endian) a, numeric, rows 0, columns 0EnglishUnited States0.4166666666666667
                                            RT_STRING0x4c4500x398dataEnglishUnited States0.375
                                            RT_STRING0x4c7e80x2aedataEnglishUnited States0.3688046647230321
                                            RT_STRING0x4ca980x42dataEnglishUnited States0.4696969696969697
                                            RT_STRING0x4cae00x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cb000x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cb200x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cb400x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cb600x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cb800x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cba00x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cbc00x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cbe00x7adataEnglishUnited States0.6475409836065574
                                            RT_STRING0x4cc600x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cc800x20dataEnglishUnited States0.34375
                                            RT_STRING0x4cca00x13aMatlab v4 mat-file (little endian) ', numeric, rows 0, columns 0EnglishUnited States0.3821656050955414
                                            RT_STRING0x4cde00x19adataEnglishUnited States0.4195121951219512
                                            RT_STRING0x4cf800x9adataEnglishUnited States0.512987012987013
                                            RT_STRING0x4d0200xa8dataEnglishUnited States0.5833333333333334
                                            RT_STRING0x4d0c80x20dataEnglishUnited States0.34375
                                            RT_VERSION0x4f7f00x31cdataEnglishUnited States0.4296482412060301
                                            RT_HTML0x4d0e80x49HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8493150684931506
                                            RT_HTML0x4d1380xdHTML document, ASCII text, with no line terminatorsEnglishUnited States1.3076923076923077
                                            RT_HTML0x4d1480x6beHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5179606025492468
                                            DLLImport
                                            MFC42.DLL
                                            MSVCRT.dll_strcmpi
                                            KERNEL32.dllCreateDirectoryA
                                            USER32.dllGetDesktopWindow
                                            ADVAPI32.dllRegDeleteValueA
                                            WS2_32.dllhtons
                                            SHLWAPI.dllPathIsDirectoryA
                                            ole32.dllCoUninitialize
                                            OLEAUT32.dllSafeArrayGetVartype
                                            MSVCP60.dll?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
                                            NETAPI32.dllNetbios
                                            KERNEL32.dllGetModuleFileNameW
                                            KERNEL32.dllGetModuleHandleA, LoadLibraryA, LocalAlloc, LocalFree, GetModuleFileNameA, ExitProcess
                                            NameOrdinalAddress
                                            DoAddToFavDlg10x10008645
                                            InputFile20x1000678b
                                            PrintFile30x1000443d
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 19, 2024 13:18:22.048537970 CET4974018530192.168.2.4107.163.56.110
                                            Nov 19, 2024 13:18:22.048964024 CET4974118659192.168.2.4107.160.131.253
                                            Nov 19, 2024 13:18:23.061832905 CET4974118659192.168.2.4107.160.131.253
                                            Nov 19, 2024 13:18:23.061947107 CET4974018530192.168.2.4107.163.56.110
                                            Nov 19, 2024 13:18:25.061863899 CET4974118659192.168.2.4107.160.131.253
                                            Nov 19, 2024 13:18:25.061878920 CET4974018530192.168.2.4107.163.56.110
                                            Nov 19, 2024 13:18:29.061863899 CET4974018530192.168.2.4107.163.56.110
                                            Nov 19, 2024 13:18:29.077466965 CET4974118659192.168.2.4107.160.131.253
                                            Nov 19, 2024 13:18:37.061889887 CET4974018530192.168.2.4107.163.56.110
                                            Nov 19, 2024 13:18:37.093113899 CET4974118659192.168.2.4107.160.131.253
                                            Nov 19, 2024 13:18:47.135231972 CET4976423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:47.137243032 CET4976523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:48.140038967 CET4976523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:48.140363932 CET4976423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:50.139990091 CET4976423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:50.140074968 CET4976523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:51.112329006 CET4979080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:18:51.150532007 CET4979223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:51.271297932 CET4979423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:52.140028000 CET4979223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:52.280653000 CET4979080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:18:52.280670881 CET4979423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:54.171263933 CET4979223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:54.390093088 CET4979423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:54.390137911 CET4979080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:18:55.156553984 CET4981823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:55.271756887 CET4982023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:55.272110939 CET4982180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:18:56.171252966 CET4981823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:56.374376059 CET4982023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:56.375252008 CET4982180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:18:58.171272039 CET4981823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:58.374398947 CET4982023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:58.374418974 CET4982180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:18:59.172570944 CET4984823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:59.325823069 CET4985123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:18:59.327474117 CET4985280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:00.280654907 CET4984823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:00.390048027 CET4985280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:00.390099049 CET4985123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:02.329382896 CET4984823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:02.480479956 CET4985280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:02.480568886 CET4985123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:03.356714010 CET4988223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:03.474198103 CET4988423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:03.538794994 CET4988680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:04.374392986 CET4988223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:04.561925888 CET4988423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:04.561924934 CET4988680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:06.374397993 CET4988223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:06.561892986 CET4988423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:06.561913013 CET4988680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:07.359667063 CET4991923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:07.479881048 CET4992123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:07.482842922 CET4992280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:08.361557961 CET4991923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:08.468163967 CET4992123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:08.525696993 CET4992280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:10.358798027 CET4991923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:10.468173027 CET4992123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:10.630311012 CET4992280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:11.375237942 CET4995323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:11.574059010 CET4995623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:11.577353001 CET4995780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:12.390034914 CET4995323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:12.577553034 CET4995623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:12.577661037 CET4995780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:14.390060902 CET4995323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:14.577589035 CET4995780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:14.577593088 CET4995623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:15.375354052 CET4999223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:15.527808905 CET4999580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:15.529145002 CET4999623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:16.374469995 CET4999223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:16.530674934 CET4999580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:16.530685902 CET4999623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:18.374471903 CET4999223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:18.546298981 CET4999580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:18.546304941 CET4999623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:19.375407934 CET5002723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:19.497210026 CET5002923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:19.502137899 CET5003080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:20.390080929 CET5002723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:20.499416113 CET5002923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:20.515043974 CET5003080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:22.390050888 CET5002723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:22.515055895 CET5003080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:22.515158892 CET5002923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:23.391130924 CET5006523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:23.504271984 CET5006823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:23.505750895 CET5006980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:24.390074015 CET5006523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:24.515079975 CET5006823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:24.515100956 CET5006980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:26.390095949 CET5006523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:26.530673027 CET5006823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:26.531073093 CET5006980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:27.407202005 CET5010423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:27.521267891 CET5010623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:27.522701025 CET5010780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:28.421411991 CET5010423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:28.530709028 CET5010623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:28.530770063 CET5010780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:30.437000990 CET5010423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:30.546370029 CET5010623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:30.548027992 CET5010780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:31.408539057 CET5014323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:31.521815062 CET5014523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:31.521985054 CET5014680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:32.421334028 CET5014323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:32.530741930 CET5014523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:32.530745029 CET5014680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:34.437115908 CET5014323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:34.530752897 CET5014523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:34.546348095 CET5014680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:35.422389984 CET5019223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:35.539071083 CET5019523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:35.539674997 CET5019680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:36.436959028 CET5019223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:36.546394110 CET5019523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:36.546488047 CET5019680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:38.436980009 CET5019223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:38.546364069 CET5019523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:38.546370029 CET5019680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:39.462774038 CET5024223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:39.565692902 CET5024580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:39.580967903 CET5024623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:40.468230009 CET5024223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:40.577600002 CET5024580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:40.593214035 CET5024623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:42.468242884 CET5024223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:42.593215942 CET5024580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:42.593219042 CET5024623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:43.478548050 CET5029623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:43.602391958 CET5029923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:43.604712009 CET5030080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:44.486110926 CET5029623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:44.608875036 CET5029923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:44.608928919 CET5030080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:46.499464035 CET5029623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:46.608876944 CET5029923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:46.609129906 CET5030080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:47.485163927 CET5035623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:47.598889112 CET5036023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:47.599699974 CET5036180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:48.499454021 CET5035623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:48.608848095 CET5036180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:48.608853102 CET5036023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:50.515100002 CET5035623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:50.624471903 CET5036180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:50.624633074 CET5036023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:51.490907907 CET5042423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:51.597378969 CET5042823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:52.128925085 CET5044080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:52.499497890 CET5042423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:52.608872890 CET5042823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:53.140316963 CET5044080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:54.499537945 CET5042423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:54.624484062 CET5042823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:55.140095949 CET5044080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:55.500935078 CET5050323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:55.613717079 CET5050823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:55.615772009 CET5050980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:56.515105009 CET5050323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:56.624486923 CET5050980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:56.624496937 CET5050823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:58.515129089 CET5050323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:58.640149117 CET5050823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:58.640151024 CET5050980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:59.516247034 CET5060523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:19:59.629674911 CET5061180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:19:59.629808903 CET5061023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:00.530738115 CET5060523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:00.640121937 CET5061023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:00.640186071 CET5061180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:02.530738115 CET5060523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:02.641954899 CET5061023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:02.642050028 CET5061180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:03.535337925 CET5070323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:03.644848108 CET5070423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:03.646821022 CET5070580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:04.593275070 CET5070323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:04.749298096 CET5070423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:04.749598980 CET5070580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:06.687005997 CET5070323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:06.797483921 CET5070423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:06.797605038 CET5070580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:07.548072100 CET5088123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:07.665133953 CET5089180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:07.665379047 CET5089023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:08.577646017 CET5088123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:08.765117884 CET5089023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:08.765141964 CET5089180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:10.671394110 CET5088123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:10.874511957 CET5089023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:10.874538898 CET5089180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:11.563838005 CET5107123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:11.685025930 CET5107980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:11.685570955 CET5108023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:12.671402931 CET5107123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:12.769589901 CET5108023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:12.769592047 CET5107980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:14.671391964 CET5107123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:14.774666071 CET5107980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:14.774666071 CET5108023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:15.608108044 CET5128923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:15.731447935 CET5129823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:15.736401081 CET5129980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:16.782712936 CET5128923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:16.874531984 CET5129980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:16.874533892 CET5129823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:18.781356096 CET5128923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:18.874542952 CET5129980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:18.874547005 CET5129823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:19.613500118 CET5148723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:19.727855921 CET5149023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:19.786082029 CET5149280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:20.781303883 CET5148723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:20.874551058 CET5149023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:20.890158892 CET5149280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:22.780801058 CET5148723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:22.874525070 CET5149023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:22.890311956 CET5149280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:23.850233078 CET5163723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:23.851000071 CET5163823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:23.984807968 CET5163980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:24.890166044 CET5163723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:24.890186071 CET5163823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:25.005198002 CET5163980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:26.890186071 CET5163723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:26.890234947 CET5163823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:27.030781031 CET5163980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:27.861223936 CET5265623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:28.006258011 CET5268623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:28.008310080 CET5268880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:28.874672890 CET5265623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:29.038379908 CET5268623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:29.038465977 CET5268880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:30.874880075 CET5265623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:31.077724934 CET5268623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:31.077900887 CET5268880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:31.876086950 CET5471523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:31.993350983 CET5477223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:31.997782946 CET5477380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:32.875267982 CET5471523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:33.039513111 CET5477380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:33.039803982 CET5477223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:34.874568939 CET5471523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:35.093350887 CET5477223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:35.093491077 CET5477380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:36.010514975 CET5751223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:36.014333963 CET5751423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:36.016479015 CET5751580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:37.077673912 CET5751223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:37.093332052 CET5751423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:37.093436956 CET5751580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:39.077677011 CET5751223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:39.187058926 CET5751423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:39.187093973 CET5751580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:40.030221939 CET5959023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:40.146106958 CET5967880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:40.149595022 CET5968023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:41.093308926 CET5959023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:41.171408892 CET5967880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:41.171489000 CET5968023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:43.171454906 CET5967880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:43.171551943 CET5968023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:43.187077999 CET5959023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:44.031641960 CET6209123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:44.198333979 CET6220023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:44.201992989 CET6220380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:45.077692032 CET6209123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:45.265185118 CET6220380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:45.330749989 CET6220023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:47.171983004 CET6209123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:47.374572992 CET6220380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:47.390216112 CET6220023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:48.048618078 CET6458623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:48.161540031 CET6470480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:48.163074970 CET6470523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:49.171468019 CET6470480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:49.171554089 CET6470523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:49.187074900 CET6458623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:51.171468973 CET6470480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:51.171473026 CET6470523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:51.187068939 CET6458623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:52.055722952 CET5083923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:52.163338900 CET5094023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:52.958724022 CET5135180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:53.093348026 CET5083923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:53.261092901 CET5094023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:54.094134092 CET5135180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:55.093337059 CET5083923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:55.317234039 CET5094023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:56.063174963 CET5309023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:56.191423893 CET5320180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:56.192712069 CET5320223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:57.077709913 CET5309023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:57.265191078 CET5320223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:57.280822039 CET5320180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:20:59.171463966 CET5309023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:59.374563932 CET5320223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:20:59.390214920 CET5320180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:00.078813076 CET5557923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:00.196602106 CET5562823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:00.198865891 CET5562980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:01.093333960 CET5557923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:01.214517117 CET5562823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:01.214627981 CET5562980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:03.148792028 CET5557923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:03.280849934 CET5562823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:03.280868053 CET5562980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:04.193073034 CET5737823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:04.194456100 CET5737923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:04.197827101 CET5738180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:05.265242100 CET5737823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:05.265247107 CET5738180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:05.280889034 CET5737923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:07.265219927 CET5737823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:07.265325069 CET5738180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:07.390233040 CET5737923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:08.229559898 CET5990123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:08.360567093 CET5992923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:08.364995003 CET5993080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:09.265230894 CET5990123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:09.382539988 CET5993080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:09.390248060 CET5992923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:11.270136118 CET5990123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:11.390239000 CET5992923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:11.562127113 CET5993080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:12.359394073 CET6190723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:12.361346006 CET6190823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:12.363114119 CET6190980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:13.374619007 CET6190723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:13.390271902 CET6190823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:13.390701056 CET6190980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:15.374623060 CET6190723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:15.484045029 CET6190980192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:15.484059095 CET6190823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:16.376260996 CET6428123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:16.504973888 CET6439423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:16.506231070 CET6439580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:17.374599934 CET6428123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:17.577750921 CET6439423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:17.577759981 CET6439580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:19.374610901 CET6428123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:19.671499968 CET6439423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:19.671636105 CET6439580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:20.391351938 CET5067123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:20.517393112 CET5072123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:20.519309998 CET5072280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:21.577893972 CET5072280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:21.593375921 CET5067123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:21.593396902 CET5072123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:23.577846050 CET5072280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:23.593377113 CET5067123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:23.593381882 CET5072123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:24.393754005 CET5360323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:24.519931078 CET5366423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:24.520015955 CET5366380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:25.440757036 CET5360323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:25.577790022 CET5366423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:25.593398094 CET5366380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:27.577764988 CET5366423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:27.593410969 CET5366380192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:27.593508005 CET5360323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:28.409095049 CET5624923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:28.531368971 CET5625023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:28.571548939 CET5625180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:29.577794075 CET5625180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:29.577795029 CET5624923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:29.577797890 CET5625023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:31.577785015 CET5624923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:31.577796936 CET5625023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:31.578092098 CET5625180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:32.427947044 CET5867823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:32.538361073 CET5872223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:32.544940948 CET5872580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:33.430696011 CET5867823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:33.593420029 CET5872580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:33.593425035 CET5872223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:35.484038115 CET5867823588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:35.593473911 CET5872223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:35.593772888 CET5872580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:36.438147068 CET6074923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:36.557540894 CET6087623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:36.558084011 CET6087780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:37.484040022 CET6074923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:37.593430042 CET6087623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:37.594141006 CET6087780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:39.504702091 CET6074923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:39.687166929 CET6087623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:39.687263012 CET6087780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:40.439740896 CET6273723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:40.556997061 CET6282423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:40.558512926 CET6282580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:41.532423019 CET6273723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:41.687186003 CET6282580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:41.687186003 CET6282423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:43.593444109 CET6273723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:43.780925989 CET6282423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:43.781269073 CET6282580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:44.454063892 CET6507323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:44.570277929 CET6520023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:44.571264982 CET6520180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:45.528700113 CET6507323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:45.687210083 CET6520023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:45.687310934 CET6520180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:47.596362114 CET6507323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:47.780982971 CET6520023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:47.781120062 CET6520180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:48.468204021 CET5106923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:48.623955965 CET5107023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:48.629446030 CET5107180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:49.529819965 CET5106923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:49.687223911 CET5107023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:49.687248945 CET5107180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:51.535784006 CET5106923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:51.687205076 CET5107023588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:51.687342882 CET5107180192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:52.469680071 CET5336423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:52.587366104 CET5345223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:53.003377914 CET5365880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:53.520421028 CET5336423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:53.687365055 CET5345223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:54.025782108 CET5365880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:55.568093061 CET5336423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:55.687505960 CET5345223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:56.093455076 CET5365880192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:56.485476017 CET5619423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:56.610641956 CET5631523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:56.617932081 CET5631780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:57.599081993 CET5619423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:57.766221046 CET5631780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:21:57.781009912 CET5631523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:59.593821049 CET5619423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:59.784616947 CET5631523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:21:59.874792099 CET5631780192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:00.501244068 CET5805723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:00.616235018 CET5815280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:00.618053913 CET5815423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:01.577816963 CET5805723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:01.687216043 CET5815280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:01.687225103 CET5815423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:03.577847958 CET5805723588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:03.687221050 CET5815280192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:03.687228918 CET5815423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:04.501297951 CET6014123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:04.653048038 CET6019580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:04.654165030 CET6019623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:05.562304020 CET6014123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:05.671614885 CET6019580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:05.671727896 CET6019623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:07.562211990 CET6014123588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:07.671633959 CET6019580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:07.671746016 CET6019623588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:08.516457081 CET6248323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:08.636944056 CET6248423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:08.645102978 CET6248580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:09.577831984 CET6248323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:09.687239885 CET6248423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:09.687355042 CET6248580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:11.577848911 CET6248323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:11.780982971 CET6248423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:11.781266928 CET6248580192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:12.516741991 CET6454323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:12.634015083 CET6466523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:12.638298035 CET6466680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:13.577836037 CET6454323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:13.687243938 CET6466523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:13.765429974 CET6466680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:15.577847004 CET6454323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:15.687237024 CET6466523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:15.766309023 CET6466680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:16.534532070 CET5055423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:16.672319889 CET5062523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:16.673686028 CET5062680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:17.538872957 CET5055423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:17.690242052 CET5062523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:17.765347958 CET5062680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:19.624206066 CET5055423588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:19.768578053 CET5062680192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:19.780976057 CET5062523588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:20.548131943 CET5285323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:20.681823015 CET5292923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:20.684046030 CET5293080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:21.562237024 CET5285323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:21.709225893 CET5292923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:21.876528978 CET5293080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:23.580322981 CET5285323588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:23.781024933 CET5292923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:23.968539000 CET5293080192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:24.568712950 CET5331923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:24.716173887 CET5332223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:24.718379021 CET5332480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:25.562263012 CET5331923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:25.719820023 CET5332480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:25.874742031 CET5332223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:27.562262058 CET5331923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:27.781001091 CET5332480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:27.874754906 CET5332223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:31.562237024 CET5331923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:31.781002045 CET5332480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:31.890392065 CET5332223588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:39.577877045 CET5331923588192.168.2.4107.160.131.254
                                            Nov 19, 2024 13:22:39.781032085 CET5332480192.168.2.4202.108.0.52
                                            Nov 19, 2024 13:22:39.890389919 CET5332223588192.168.2.4107.160.131.254
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 19, 2024 13:18:44.119891882 CET6090753192.168.2.41.1.1.1
                                            Nov 19, 2024 13:18:44.651799917 CET53609071.1.1.1192.168.2.4
                                            Nov 19, 2024 13:18:48.267229080 CET5691953192.168.2.41.1.1.1
                                            Nov 19, 2024 13:18:48.798772097 CET53569191.1.1.1192.168.2.4
                                            Nov 19, 2024 13:18:50.660502911 CET4946453192.168.2.41.1.1.1
                                            Nov 19, 2024 13:18:51.094892025 CET53494641.1.1.1192.168.2.4
                                            Nov 19, 2024 13:18:53.506879091 CET5990353192.168.2.41.1.1.1
                                            Nov 19, 2024 13:18:54.068568945 CET53599031.1.1.1192.168.2.4
                                            Nov 19, 2024 13:18:58.204327106 CET6243153192.168.2.41.1.1.1
                                            Nov 19, 2024 13:18:58.733843088 CET53624311.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:03.393507957 CET4952353192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:03.404277086 CET53495231.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:08.251753092 CET5907653192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:08.767483950 CET53590761.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:13.203535080 CET5356953192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:13.210664988 CET53535691.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:18.222940922 CET5150853192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:18.741583109 CET53515081.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:23.263957024 CET5382153192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:23.272671938 CET53538211.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:28.234705925 CET5614553192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:28.758327961 CET53561451.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:33.244900942 CET6016053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:33.252099037 CET53601601.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:38.203547001 CET6447553192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:38.742898941 CET53644751.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:43.469425917 CET5051053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:43.477853060 CET53505101.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:48.172313929 CET6333853192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:48.689483881 CET53633381.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:51.629317999 CET5539353192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:52.128176928 CET53553931.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:53.203690052 CET5034053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:53.768621922 CET53503401.1.1.1192.168.2.4
                                            Nov 19, 2024 13:19:58.188425064 CET6000653192.168.2.41.1.1.1
                                            Nov 19, 2024 13:19:58.992417097 CET53600061.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:03.174535036 CET6398753192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:03.686950922 CET53639871.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:08.190300941 CET5334153192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:08.706626892 CET53533411.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:13.198071003 CET5313853192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:13.205178022 CET53531381.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:18.173748016 CET5937053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:18.746479034 CET53593701.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:23.182076931 CET5298053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:23.959041119 CET53529801.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:28.171667099 CET5261053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:28.976007938 CET53526101.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:33.171930075 CET5846253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:33.179172993 CET53584621.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:38.174482107 CET5116253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:38.879429102 CET53511621.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:43.173259974 CET5395953192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:43.739478111 CET53539591.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:48.174981117 CET5070853192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:48.182396889 CET53507081.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:52.260427952 CET5703053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:52.957703114 CET53570301.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:53.172297001 CET5470053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:53.855823040 CET53547001.1.1.1192.168.2.4
                                            Nov 19, 2024 13:20:58.175903082 CET6553353192.168.2.41.1.1.1
                                            Nov 19, 2024 13:20:58.183680058 CET53655331.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:03.174149990 CET5296653192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:03.775631905 CET53529661.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:08.172528028 CET5614253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:08.180111885 CET53561421.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:13.172472000 CET5467153192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:13.690617085 CET53546711.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:18.198633909 CET6361753192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:18.722723007 CET53636171.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:23.173294067 CET6278853192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:23.180836916 CET53627881.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:28.182641029 CET5087053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:28.699582100 CET53508701.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:33.172538042 CET6098953192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:33.835979939 CET53609891.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:38.172022104 CET6145253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:38.751797915 CET53614521.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:43.172972918 CET5749353192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:43.740088940 CET53574931.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:48.174196005 CET5738553192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:48.772150993 CET53573851.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:52.587991953 CET5526253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:52.977952957 CET53552621.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:53.183461905 CET6128053192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:53.190995932 CET53612801.1.1.1192.168.2.4
                                            Nov 19, 2024 13:21:58.173227072 CET5884253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:21:58.707442999 CET53588421.1.1.1192.168.2.4
                                            Nov 19, 2024 13:22:03.172323942 CET5988253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:22:03.179351091 CET53598821.1.1.1192.168.2.4
                                            Nov 19, 2024 13:22:08.172020912 CET6429253192.168.2.41.1.1.1
                                            Nov 19, 2024 13:22:08.818671942 CET53642921.1.1.1192.168.2.4
                                            Nov 19, 2024 13:22:13.198558092 CET5461953192.168.2.41.1.1.1
                                            Nov 19, 2024 13:22:13.747597933 CET53546191.1.1.1192.168.2.4
                                            Nov 19, 2024 13:22:18.177263021 CET5459453192.168.2.41.1.1.1
                                            Nov 19, 2024 13:22:18.696722031 CET53545941.1.1.1192.168.2.4
                                            Nov 19, 2024 13:22:23.282488108 CET6543653192.168.2.41.1.1.1
                                            Nov 19, 2024 13:22:23.289880991 CET53654361.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Nov 19, 2024 13:18:44.119891882 CET192.168.2.41.1.1.10xe893Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:48.267229080 CET192.168.2.41.1.1.10xdb92Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:50.660502911 CET192.168.2.41.1.1.10xf87eStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:53.506879091 CET192.168.2.41.1.1.10xd91fStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:58.204327106 CET192.168.2.41.1.1.10xa1c8Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:03.393507957 CET192.168.2.41.1.1.10x7c1eStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:08.251753092 CET192.168.2.41.1.1.10x6f80Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:13.203535080 CET192.168.2.41.1.1.10x5076Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:18.222940922 CET192.168.2.41.1.1.10x9031Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:23.263957024 CET192.168.2.41.1.1.10x212aStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:28.234705925 CET192.168.2.41.1.1.10x5015Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:33.244900942 CET192.168.2.41.1.1.10x178Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:38.203547001 CET192.168.2.41.1.1.10x68c6Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:43.469425917 CET192.168.2.41.1.1.10x54bdStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:48.172313929 CET192.168.2.41.1.1.10xd456Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:51.629317999 CET192.168.2.41.1.1.10x17adStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:53.203690052 CET192.168.2.41.1.1.10x27a1Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:58.188425064 CET192.168.2.41.1.1.10x4889Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:03.174535036 CET192.168.2.41.1.1.10x9dfeStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:08.190300941 CET192.168.2.41.1.1.10x487eStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:13.198071003 CET192.168.2.41.1.1.10x6a2Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:18.173748016 CET192.168.2.41.1.1.10xe71dStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:23.182076931 CET192.168.2.41.1.1.10x5ce1Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:28.171667099 CET192.168.2.41.1.1.10x9b4aStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:33.171930075 CET192.168.2.41.1.1.10x3115Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:38.174482107 CET192.168.2.41.1.1.10x9226Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:43.173259974 CET192.168.2.41.1.1.10x39a4Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:48.174981117 CET192.168.2.41.1.1.10x86dcStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:52.260427952 CET192.168.2.41.1.1.10x7cd1Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:53.172297001 CET192.168.2.41.1.1.10xbc8bStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:58.175903082 CET192.168.2.41.1.1.10x8c3aStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:03.174149990 CET192.168.2.41.1.1.10x5bbdStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:08.172528028 CET192.168.2.41.1.1.10x2615Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:13.172472000 CET192.168.2.41.1.1.10x1e9dStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:18.198633909 CET192.168.2.41.1.1.10x88daStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:23.173294067 CET192.168.2.41.1.1.10x6b10Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:28.182641029 CET192.168.2.41.1.1.10x48a7Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:33.172538042 CET192.168.2.41.1.1.10xc95cStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:38.172022104 CET192.168.2.41.1.1.10x6e4bStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:43.172972918 CET192.168.2.41.1.1.10x1c87Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:48.174196005 CET192.168.2.41.1.1.10xc9a4Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:52.587991953 CET192.168.2.41.1.1.10xb4a4Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:53.183461905 CET192.168.2.41.1.1.10xbabdStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:58.173227072 CET192.168.2.41.1.1.10xdf3bStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:03.172323942 CET192.168.2.41.1.1.10xee55Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:08.172020912 CET192.168.2.41.1.1.10xde1bStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:13.198558092 CET192.168.2.41.1.1.10x3bd0Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:18.177263021 CET192.168.2.41.1.1.10xc907Standard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:23.282488108 CET192.168.2.41.1.1.10x51bdStandard query (0)host123.zz.amA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Nov 19, 2024 13:18:44.651799917 CET1.1.1.1192.168.2.40xe893Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:48.798772097 CET1.1.1.1192.168.2.40xdb92Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:51.094892025 CET1.1.1.1192.168.2.40xf87eNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)false
                                            Nov 19, 2024 13:18:51.094892025 CET1.1.1.1192.168.2.40xf87eNo error (0)blogx.sina.com.cn202.108.0.52A (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:54.068568945 CET1.1.1.1192.168.2.40xd91fName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:18:58.733843088 CET1.1.1.1192.168.2.40xa1c8Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:03.404277086 CET1.1.1.1192.168.2.40x7c1eName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:08.767483950 CET1.1.1.1192.168.2.40x6f80Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:13.210664988 CET1.1.1.1192.168.2.40x5076Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:18.741583109 CET1.1.1.1192.168.2.40x9031Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:23.272671938 CET1.1.1.1192.168.2.40x212aName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:28.758327961 CET1.1.1.1192.168.2.40x5015Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:33.252099037 CET1.1.1.1192.168.2.40x178Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:38.742898941 CET1.1.1.1192.168.2.40x68c6Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:43.477853060 CET1.1.1.1192.168.2.40x54bdName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:48.689483881 CET1.1.1.1192.168.2.40xd456Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:52.128176928 CET1.1.1.1192.168.2.40x17adNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)false
                                            Nov 19, 2024 13:19:52.128176928 CET1.1.1.1192.168.2.40x17adNo error (0)blogx.sina.com.cn202.108.0.52A (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:53.768621922 CET1.1.1.1192.168.2.40x27a1Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:19:58.992417097 CET1.1.1.1192.168.2.40x4889Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:03.686950922 CET1.1.1.1192.168.2.40x9dfeName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:08.706626892 CET1.1.1.1192.168.2.40x487eName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:13.205178022 CET1.1.1.1192.168.2.40x6a2Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:18.746479034 CET1.1.1.1192.168.2.40xe71dName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:23.959041119 CET1.1.1.1192.168.2.40x5ce1Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:28.976007938 CET1.1.1.1192.168.2.40x9b4aName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:33.179172993 CET1.1.1.1192.168.2.40x3115Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:38.879429102 CET1.1.1.1192.168.2.40x9226Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:43.739478111 CET1.1.1.1192.168.2.40x39a4Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:48.182396889 CET1.1.1.1192.168.2.40x86dcName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:52.957703114 CET1.1.1.1192.168.2.40x7cd1No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)false
                                            Nov 19, 2024 13:20:52.957703114 CET1.1.1.1192.168.2.40x7cd1No error (0)blogx.sina.com.cn202.108.0.52A (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:53.855823040 CET1.1.1.1192.168.2.40xbc8bName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:20:58.183680058 CET1.1.1.1192.168.2.40x8c3aName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:03.775631905 CET1.1.1.1192.168.2.40x5bbdName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:08.180111885 CET1.1.1.1192.168.2.40x2615Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:13.690617085 CET1.1.1.1192.168.2.40x1e9dName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:18.722723007 CET1.1.1.1192.168.2.40x88daName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:23.180836916 CET1.1.1.1192.168.2.40x6b10Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:28.699582100 CET1.1.1.1192.168.2.40x48a7Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:33.835979939 CET1.1.1.1192.168.2.40xc95cName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:38.751797915 CET1.1.1.1192.168.2.40x6e4bName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:43.740088940 CET1.1.1.1192.168.2.40x1c87Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:48.772150993 CET1.1.1.1192.168.2.40xc9a4Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:52.977952957 CET1.1.1.1192.168.2.40xb4a4No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)false
                                            Nov 19, 2024 13:21:52.977952957 CET1.1.1.1192.168.2.40xb4a4No error (0)blogx.sina.com.cn202.108.0.52A (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:53.190995932 CET1.1.1.1192.168.2.40xbabdName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:21:58.707442999 CET1.1.1.1192.168.2.40xdf3bName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:03.179351091 CET1.1.1.1192.168.2.40xee55Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:08.818671942 CET1.1.1.1192.168.2.40xde1bName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:13.747597933 CET1.1.1.1192.168.2.40x3bd0Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:18.696722031 CET1.1.1.1192.168.2.40xc907Name error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false
                                            Nov 19, 2024 13:22:23.289880991 CET1.1.1.1192.168.2.40x51bdName error (3)host123.zz.amnonenoneA (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\System32\loaddll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll"
                                            Imagebase:0xbe0000
                                            File size:126'464 bytes
                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,DoAddToFavDlg
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:4
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",#1
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:07:18:18
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\PING.EXE
                                            Wow64 process (32bit):true
                                            Commandline:ping 127.0.0.1 -n 3
                                            Imagebase:0xdf0000
                                            File size:18'944 bytes
                                            MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:07:18:21
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,InputFile
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:07:18:24
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\Vb1S2HJcnN.dll,PrintFile
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:12
                                            Start time:07:18:24
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 676
                                            Imagebase:0xf50000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:13
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:14
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",InputFile
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:15
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\Vb1S2HJcnN.dll",PrintFile
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:16
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:18
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:19
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\PING.EXE
                                            Wow64 process (32bit):true
                                            Commandline:ping 127.0.0.1 -n 3
                                            Imagebase:0xdf0000
                                            File size:18'944 bytes
                                            MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:20
                                            Start time:07:18:27
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 668
                                            Imagebase:0xf50000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:24
                                            Start time:07:18:51
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:25
                                            Start time:07:18:51
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:26
                                            Start time:07:18:51
                                            Start date:19/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:27
                                            Start time:07:18:51
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\PING.EXE
                                            Wow64 process (32bit):true
                                            Commandline:ping 127.0.0.1 -n 3
                                            Imagebase:0xdf0000
                                            File size:18'944 bytes
                                            MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:28
                                            Start time:07:18:59
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\Vb1S2HJcnN.dll",DoAddToFavDlg
                                            Imagebase:0xbe0000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:29
                                            Start time:07:18:59
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:30
                                            Start time:07:18:59
                                            Start date:19/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:31
                                            Start time:07:18:59
                                            Start date:19/11/2024
                                            Path:C:\Windows\SysWOW64\PING.EXE
                                            Wow64 process (32bit):true
                                            Commandline:ping 127.0.0.1 -n 3
                                            Imagebase:0xdf0000
                                            File size:18'944 bytes
                                            MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:4.5%
                                              Dynamic/Decrypted Code Coverage:99.6%
                                              Signature Coverage:1.2%
                                              Total number of Nodes:251
                                              Total number of Limit Nodes:10
                                              execution_graph 17037 10007101 17042 10007118 17037->17042 17041 100071a6 Sleep 17041->17042 17042->17041 17043 100071f7 wsprintfA 17042->17043 17046 10005c4c 17042->17046 17061 10003ef4 17042->17061 17064 100061bd 17042->17064 17083 1000570f 17043->17083 17047 10003ef4 wvsprintfA 17046->17047 17048 10005c86 17047->17048 17094 10003f72 PathFileExistsA 17048->17094 17050 10005c92 17051 10005c99 17050->17051 17052 10005c9d 17050->17052 17051->17042 17095 10004015 CreateFileA 17052->17095 17054 10005cbb 17054->17051 17096 10004035 ReadFile 17054->17096 17056 10005cd6 17097 10003f92 CloseHandle 17056->17097 17058 10005cdc 17098 10003f7d StrStrIA 17058->17098 17060 10005ce9 17060->17051 17099 10003ee1 wvsprintfA 17061->17099 17063 10003f06 17063->17042 17065 100061dd 17064->17065 17100 10003f0a InternetOpenA 17065->17100 17067 100061e4 17077 100061ee 17067->17077 17101 10003f24 InternetOpenUrlA 17067->17101 17069 10006206 17070 10006210 17069->17070 17071 10006219 17069->17071 17102 10003f58 InternetCloseHandle 17070->17102 17073 10006276 17071->17073 17079 1000621f 17071->17079 17105 10003f58 InternetCloseHandle 17073->17105 17075 10006216 17106 10003f58 InternetCloseHandle 17075->17106 17077->17042 17080 1000626c 17079->17080 17103 10003f41 InternetReadFile 17079->17103 17104 10003f92 CloseHandle 17080->17104 17082 10006274 17082->17073 17084 1000571c 17083->17084 17085 10005724 wsprintfA 17084->17085 17107 10005318 17085->17107 17087 10005776 wsprintfA wsprintfA 17109 10035e22 17087->17109 17094->17050 17095->17054 17096->17056 17097->17058 17098->17060 17099->17063 17100->17067 17101->17069 17102->17075 17103->17079 17104->17082 17105->17075 17106->17077 17108 10005325 17107->17108 17108->17087 17110 1003bf35 17109->17110 17124 10004482 17125 1000448d 17124->17125 17128 100040ba RegOpenKeyExA 17125->17128 17127 100044a4 17128->17127 17129 10006dc4 17131 10006dce 17129->17131 17130 10006ec4 17131->17130 17132 10003ef4 wvsprintfA 17131->17132 17133 10006e8f 17132->17133 17134 10003ef4 wvsprintfA 17133->17134 17135 10006eb8 17134->17135 17137 10006290 17135->17137 17138 100062a2 17137->17138 17147 10003f0a InternetOpenA 17138->17147 17140 100062a9 17141 100062da 17140->17141 17148 10003f24 InternetOpenUrlA 17140->17148 17141->17130 17143 100062c4 17149 10003f58 InternetCloseHandle 17143->17149 17145 100062d4 17150 10003f58 InternetCloseHandle 17145->17150 17147->17140 17148->17143 17149->17145 17150->17141 17151 10005846 17152 1000584d 17151->17152 17153 10005862 17152->17153 17155 10003eb4 gethostbyname 17152->17155 17155->17153 17156 10008567 Sleep 17157 1000858a 17156->17157 17158 100061bd 5 API calls 17157->17158 17159 100085b1 17158->17159 17160 100085ba Sleep 17159->17160 17161 100085c3 17159->17161 17160->17159 17162 1000826c 17165 100082a6 17162->17165 17163 10005c4c 6 API calls 17163->17165 17164 10003ef4 wvsprintfA 17164->17165 17165->17163 17165->17164 17166 100061bd 5 API calls 17165->17166 17167 1000838e Sleep 17165->17167 17169 100083df wsprintfA 17165->17169 17170 1000720e 17165->17170 17166->17165 17167->17165 17169->17165 17171 10007218 17170->17171 17173 1000726f 17171->17173 17175 1000756c 17171->17175 17199 10007a62 17171->17199 17173->17175 17203 1000504d 17173->17203 17175->17165 17176 100072b4 17177 10007404 17176->17177 17207 10007ccb 17176->17207 17177->17175 17179 10007ccb MultiByteToWideChar 17177->17179 17181 100074a5 17179->17181 17180 100072fb 17180->17177 17182 1000504d MultiByteToWideChar 17180->17182 17181->17175 17183 1000504d MultiByteToWideChar 17181->17183 17184 1000731d SafeArrayCreate VariantInit SafeArrayCreate VariantInit 17182->17184 17185 100074ca 17183->17185 17188 1000504d MultiByteToWideChar 17184->17188 17186 1000504d MultiByteToWideChar 17185->17186 17189 100074d9 SafeArrayCreate 17186->17189 17191 10007392 17188->17191 17192 10007519 17189->17192 17194 1000504d MultiByteToWideChar 17191->17194 17193 1000504d MultiByteToWideChar 17192->17193 17195 1000752f 17193->17195 17196 100073cb 17194->17196 17197 1000504d MultiByteToWideChar 17195->17197 17198 1000504d MultiByteToWideChar 17196->17198 17197->17175 17198->17177 17200 10007a6c 17199->17200 17201 1000504d MultiByteToWideChar 17200->17201 17202 10007ab6 17200->17202 17201->17202 17202->17173 17204 10005057 17203->17204 17206 10005078 17204->17206 17211 100050f5 17204->17211 17206->17176 17208 10007cd5 17207->17208 17209 1000504d MultiByteToWideChar 17208->17209 17210 10007ce9 17208->17210 17209->17210 17210->17180 17214 1000d0ae 17211->17214 17213 1000510c 17213->17206 17215 1000d0bd 17214->17215 17217 1000d0b9 17214->17217 17216 1000d0d6 MultiByteToWideChar 17215->17216 17216->17217 17217->17213 17218 100044ad 17220 10004489 17218->17220 17219 100044d9 GetExtendedUdpTable 17219->17220 17220->17218 17220->17219 17221 100044fe 17220->17221 17223 10004456 17220->17223 17222 10004509 GetExtendedUdpTable 17221->17222 17221->17223 17222->17223 17224 10004351 17226 1000436c 17224->17226 17225 10004370 17226->17225 17227 10004399 Sleep 17226->17227 17228 100043b3 17227->17228 17229 100043e0 Sleep 17228->17229 17230 100043ef 17229->17230 17230->17225 17231 100087b6 17232 100087bb CreateThread Sleep CreateThread Sleep 17231->17232 17233 100087eb 17232->17233 17234 1000841c 17232->17234 17239 10006a6e 17232->17239 17235 10008429 17234->17235 17236 100085ba Sleep 17235->17236 17237 1000855a Sleep 17235->17237 17237->17235 17240 10006a82 17239->17240 17249 10003ece CreateMutexA 17240->17249 17242 10006aa3 GetLastError 17243 10006b0b 17242->17243 17244 10006ab4 17242->17244 17246 10006ae1 CreateThread 17244->17246 17247 10006ad8 Sleep 17244->17247 17250 10006499 17244->17250 17248 10006b02 17246->17248 17269 1000687e 17246->17269 17247->17244 17248->17247 17249->17242 17251 100064a3 17250->17251 17252 100064e9 wsprintfA 17251->17252 17253 10006508 17252->17253 17266 10003f0a InternetOpenA 17253->17266 17255 1000652b 17256 100066d0 17255->17256 17267 10003f24 InternetOpenUrlA 17255->17267 17256->17244 17258 1000654b 17258->17256 17264 10006559 ctype 17258->17264 17260 100065bf MultiByteToWideChar 17260->17264 17261 100065d7 MultiByteToWideChar 17261->17264 17262 10006647 17263 100066df wsprintfA 17262->17263 17265 100066b0 ctype 17262->17265 17263->17265 17264->17260 17264->17261 17264->17262 17268 10003f41 InternetReadFile 17264->17268 17265->17256 17266->17255 17267->17258 17268->17264 17270 100068aa 17269->17270 17277 10005db4 17270->17277 17272 100068ec 17273 10005f15 8 API calls 17274 100068c0 17273->17274 17274->17272 17274->17273 17289 10005f98 17274->17289 17298 10003f63 ExitWindowsEx 17274->17298 17278 10005de5 17277->17278 17282 10005e1e 17278->17282 17299 1000409d RegQueryValueExA 17278->17299 17280 10005e16 17300 10004092 RegCloseKey 17280->17300 17283 10003ef4 wvsprintfA 17282->17283 17284 10005e89 17283->17284 17301 10005cf7 17284->17301 17287 10003ef4 wvsprintfA 17288 10005ee1 17287->17288 17288->17274 17290 10005fb9 17289->17290 17291 10003ef4 wvsprintfA 17289->17291 17324 10004015 CreateFileA 17290->17324 17291->17290 17293 10005fe3 17293->17274 17294 10005fd9 17294->17293 17325 10003f9d WriteFile 17294->17325 17296 10005fff 17326 10003f92 CloseHandle 17296->17326 17298->17274 17299->17280 17300->17282 17302 10003ef4 wvsprintfA 17301->17302 17303 10005d31 17302->17303 17318 10003f72 PathFileExistsA 17303->17318 17305 10005d3d 17306 10005d44 17305->17306 17307 10005d48 17305->17307 17306->17287 17306->17288 17319 10004015 CreateFileA 17307->17319 17309 10005d66 17309->17306 17320 10004035 ReadFile 17309->17320 17311 10005d81 17321 10003f92 CloseHandle 17311->17321 17313 10005d87 17322 10003f7d StrStrIA 17313->17322 17315 10005d94 17315->17306 17323 10003f7d StrStrIA 17315->17323 17317 10005da8 17317->17306 17318->17305 17319->17309 17320->17311 17321->17313 17322->17315 17323->17317 17324->17294 17325->17296 17326->17293 17327 10006ed6 17330 10006cf7 17327->17330 17340 10003ff7 GetShortPathNameA 17330->17340 17332 10006d32 17341 1000406c RegCreateKeyExA 17332->17341 17334 10006d60 wsprintfA 17335 10006d9a 17334->17335 17342 100040d4 RegSetValueExA 17335->17342 17337 10006db3 17343 10004092 RegCloseKey 17337->17343 17339 10006dbe 17340->17332 17341->17334 17342->17337 17343->17339 17344 100081f7 17345 10008200 17344->17345 17347 1000825f Sleep 17345->17347 17348 10007f3e 8 API calls 17345->17348 17349 1000400a GetDriveTypeA 17345->17349 17347->17345 17348->17345 17349->17345 17350 10006ede 17352 10006eeb 17350->17352 17351 1000591c lstrcmpiA CloseHandle CreateToolhelp32Snapshot Process32First Process32Next 17351->17352 17352->17351 17353 10006f1f Sleep 17352->17353 17354 10006f2c 17352->17354 17353->17352 17355 10005c4c 6 API calls 17354->17355 17356 10003ef4 wvsprintfA 17354->17356 17357 100061bd 5 API calls 17354->17357 17358 10007053 Sleep 17354->17358 17359 10007092 wsprintfA 17354->17359 17360 100070c8 PrintFile PrintFile 17354->17360 17355->17354 17356->17354 17357->17354 17358->17354 17359->17354 17360->17354 17361 10006b1f 17362 10006b3c 17361->17362 17369 10003ece CreateMutexA 17362->17369 17364 10006b50 GetLastError 17365 10006b61 CreateThread 17364->17365 17367 10006b90 17364->17367 17366 10006b7b 17365->17366 17370 1000687e 14 API calls 17365->17370 17368 10006b83 Sleep 17366->17368 17368->17365 17369->17364

                                              Control-flow Graph

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s\%s$*.*$.$107.160.131.254:23588/article.php$12010043$L2ltYWdlLnBocA==$NPKI$P
                                              • API String ID: 0-3984435826
                                              • Opcode ID: 0a215aef5ca7b5c606a273fdfbec72fd9b9d822c18bbfb0613fe871d940a9004
                                              • Instruction ID: 154fd83921e69bd95517e48f0429fd4d3315e101fc3602ca34ca7394d0d5f03d
                                              • Opcode Fuzzy Hash: 0a215aef5ca7b5c606a273fdfbec72fd9b9d822c18bbfb0613fe871d940a9004
                                              • Instruction Fuzzy Hash: C371517690425DBEEB61D7A4DC45FEEB7BCEB48240F1004E6F608E6041DB74AB898F61
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000000,00000000,10005931,00000002,00000000,00000000,00000000), ref: 10003FBF
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CreateSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 3332741929-0
                                              • Opcode ID: 1e956e5b503a472c93e19a4642fd5130f6607d7bc175f230498bf039bbf47dc4
                                              • Instruction ID: ca46abfd3f4ae67059df7024880e3d5c8c44562ed1dec37196b9e10746ab925e
                                              • Opcode Fuzzy Hash: 1e956e5b503a472c93e19a4642fd5130f6607d7bc175f230498bf039bbf47dc4
                                              • Instruction Fuzzy Hash: D5A00136408212ABDA42AB50CD48D4AFFA2BBA8781F02C819F19980034CB32C5A5EB12

                                              Control-flow Graph

                                              APIs
                                              • Sleep.KERNEL32(0000EA60), ref: 10006F24
                                              • Sleep.KERNEL32 ref: 10007059
                                              • wsprintfA.USER32 ref: 1000709D
                                              • PrintFile.VB1S2HJCNN(00000000,?,00000000), ref: 100070D6
                                              • PrintFile.VB1S2HJCNN(00000000,?,00000000,?,00000000), ref: 100070E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: FilePrintSleep$wsprintf
                                              • String ID: QVNEU3ZjLmV4ZQ==$QVlSVFNydi5heWU=$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$c:\1.txt$http://107.160.131.254:23588/article.php$iOffset
                                              • API String ID: 1547040302-3813294871
                                              • Opcode ID: 6901e9babde4ee68b3136e4664651ea7350d119c703396e769bb1a0f608c4114
                                              • Instruction ID: e128ca64511400ca05deee7795c3814a468ccd3a13c6d035e862ae5cb279fd62
                                              • Opcode Fuzzy Hash: 6901e9babde4ee68b3136e4664651ea7350d119c703396e769bb1a0f608c4114
                                              • Instruction Fuzzy Hash: AC51D9B6D04359E6FB22D764CC56FCF77ACEB083C1F1045A5F208EA086DA75AB808E55

                                              Control-flow Graph

                                              APIs
                                              • wsprintfA.USER32 ref: 100064F7
                                                • Part of subcall function 10003F0A: InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 10003F1C
                                              • ___crtGetTimeFormatEx.LIBCMT ref: 10006546
                                                • Part of subcall function 10003F24: InternetOpenUrlA.WININET(80000100,00000000,00000000,00000000,00000000,10006206), ref: 10003F39
                                                • Part of subcall function 10003F41: InternetReadFile.WININET(?,?,?,?), ref: 10003F51
                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,74DF0ECC,0007D000,00000000,00000000), ref: 100065C8
                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,?,?,?,74DF0ECC,0007D000,00000000,00000000), ref: 100065E6
                                              • wsprintfA.USER32 ref: 100066E9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Internet$ByteCharMultiOpenWidewsprintf$FileFormatReadTime___crt
                                              • String ID: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)$aHR0cDovL2Jsb2cuc2luYS5jb20uY24vdS8lcw==$title
                                              • API String ID: 4077377486-2496724313
                                              • Opcode ID: 75abeeb0c1ce65552ecf3d51c3df04188886b104fd09b7b212ed437500202792
                                              • Instruction ID: 9bb45785208bde0406de56643d62444fa716b577ceefe44749a59ab2aa42cbd8
                                              • Opcode Fuzzy Hash: 75abeeb0c1ce65552ecf3d51c3df04188886b104fd09b7b212ed437500202792
                                              • Instruction Fuzzy Hash: 9C81E5B5C05248BEFB01DBA4DC82EEF7B7EEF09394F244059F504A7186DA356E4187A1

                                              Control-flow Graph

                                              APIs
                                              • ___crtGetTimeFormatEx.LIBCMT ref: 10005E11
                                                • Part of subcall function 1000409D: RegQueryValueExA.KERNEL32(00000000,?,000F003F,00000000,?,80000002,?,10005E16,?,ProcessorNameString,00000000,00000004,?,?,80000002,?), ref: 100040B2
                                                • Part of subcall function 10004092: RegCloseKey.KERNEL32(?,10006DBE,?), ref: 10004096
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CloseFormatQueryTimeValue___crt
                                              • String ID: %u MB$12010043$@$Find CPU Error$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$http://107.160.131.254:23588/article.php
                                              • API String ID: 271660946-3893357082
                                              • Opcode ID: 37022121a03464651817a9c0c5e1d81c5aa94c867a3c5e15367f04ef0a505e5e
                                              • Instruction ID: 4f35d1d9e5d3edf0c8f7125bb17b53cb037807f44d0344e2d1e4939474d77481
                                              • Opcode Fuzzy Hash: 37022121a03464651817a9c0c5e1d81c5aa94c867a3c5e15367f04ef0a505e5e
                                              • Instruction Fuzzy Hash: 6531C0B6804208BAFB10C764DC42FDF77BCEB08351F10406AFA18BA082EB75BA458B55

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 10003FF7: GetShortPathNameA.KERNEL32(?,?,?), ref: 10004003
                                                • Part of subcall function 1000406C: RegCreateKeyExA.KERNEL32(?,00000000,000F003F,00000000,?,00000000,00000000,80000001,10006D60,?,10006D60,80000001,00000000,00000000,REG_SZ,00000000), ref: 1000408A
                                              • wsprintfA.USER32 ref: 10006D88
                                              • ___crtGetTimeFormatEx.LIBCMT ref: 10006DAE
                                                • Part of subcall function 100040D4: RegSetValueExA.KERNEL32(00000001,?,00000001,00000000,?,?,?,10006DB3,?,dtfd,00000000,00000001,?,00000001,?), ref: 100040E9
                                                • Part of subcall function 10004092: RegCloseKey.KERNEL32(?,10006DBE,?), ref: 10004096
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CloseCreateFormatNamePathShortTimeValue___crtwsprintf
                                              • String ID: %s "%s",DoAddToFavDlg$C:\Users\user\Desktop\Vb1S2HJcnN.dll$C:\Windows\SysWOW64\rundll32.exe$REG_SZ$U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==$dtfd
                                              • API String ID: 1762869224-2962379768
                                              • Opcode ID: fe4a6ca71fda934b348afe6d657169d78400bf351d74a23e551a426737a6504a
                                              • Instruction ID: 20d4b35ab7fa00c236079ec8a4dd8982143edab80ee48f6a2419757257224b01
                                              • Opcode Fuzzy Hash: fe4a6ca71fda934b348afe6d657169d78400bf351d74a23e551a426737a6504a
                                              • Instruction Fuzzy Hash: 451160B694415CBEFB11D7A4DC86FEA776CEB14340F1404A1F704FA085DAB16F988AA4

                                              Control-flow Graph

                                              APIs
                                              • Sleep.KERNEL32(00080000,00000000,00000000), ref: 10008394
                                              • wsprintfA.USER32 ref: 100083E6
                                              Strings
                                              • XGRyaXZlcnNcZXRjXGhvc3Rz, xrefs: 100082C5
                                              • 8.8.8.8, xrefs: 100083EF
                                              • 127.0.0.1, xrefs: 100083F4
                                              • XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==, xrefs: 100082DC
                                              • http://107.160.131.254:23588/article.php, xrefs: 10008353
                                              • Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=, xrefs: 10008405
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleepwsprintf
                                              • String ID: 127.0.0.1$8.8.8.8$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=$http://107.160.131.254:23588/article.php
                                              • API String ID: 1749205058-626475063
                                              • Opcode ID: 54eedc971582e05c3486c3a0f88f100d4df9f5038933db9e4620657874ea0a6d
                                              • Instruction ID: 78e0688a60563a7bb1736696f6623559e09cac3deedd02f0104af55f58a5e4a8
                                              • Opcode Fuzzy Hash: 54eedc971582e05c3486c3a0f88f100d4df9f5038933db9e4620657874ea0a6d
                                              • Instruction Fuzzy Hash: 9E4106B6D04258B6F721D364CC46FCF77ACEB457C0F2400A6F248A9086EAB4AB848E51

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 10003ECE: CreateMutexA.KERNEL32(?,?,?,10006B50,?,?,?,00000202,?), ref: 10003EDA
                                              • GetLastError.KERNEL32 ref: 10006AA8
                                                • Part of subcall function 10006499: wsprintfA.USER32 ref: 100064F7
                                                • Part of subcall function 10006499: ___crtGetTimeFormatEx.LIBCMT ref: 10006546
                                              • Sleep.KERNEL32(0002BF20,00000000,00000000,00000000,00000000,000000FF), ref: 10006ADD
                                              • CreateThread.KERNEL32(00000000,00000000,1000687E,00000000,00000000,00000000), ref: 10006AF1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Create$ErrorFormatLastMutexSleepThreadTime___crtwsprintf
                                              • String ID: 0x5d65r455f$5762479093
                                              • API String ID: 3244495550-2446933972
                                              • Opcode ID: 3b97f3ef57c6d34437c21e844b3cc3d0ae84d0d31088cb251ee543bf93b7c76e
                                              • Instruction ID: bd1adab126fe453b34de0ea9e0b5f284958d10fa0a203dc352c1be2a30225ce5
                                              • Opcode Fuzzy Hash: 3b97f3ef57c6d34437c21e844b3cc3d0ae84d0d31088cb251ee543bf93b7c76e
                                              • Instruction Fuzzy Hash: 9701F2A4844228BAF211F3704CCADBF395DDB563D4F200528F915A908BDB24EC0145B3

                                              Control-flow Graph

                                              APIs
                                              • Sleep.KERNEL32(00002710), ref: 1000857E
                                              • Sleep.KERNEL32(001B7740,?,00000000,80000002,00000000,00000000,000F003F,?), ref: 100085BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: D$aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw=$wINsTA0\dEFauLT
                                              • API String ID: 3472027048-3516831565
                                              • Opcode ID: 97b5d75c4eae03a1f54d307b40641d8b725bb66f95620e0adc97901586be56a8
                                              • Instruction ID: 69b21accf233d090089117fd856bc82e5cd65d02c06b2ff4ec7ccf08b8a7457c
                                              • Opcode Fuzzy Hash: 97b5d75c4eae03a1f54d307b40641d8b725bb66f95620e0adc97901586be56a8
                                              • Instruction Fuzzy Hash: 6421817680525CBAEB11EBE4CC46EDFBB7CEF08390F1400A9F604BB151DB765A458B91

                                              Control-flow Graph

                                              APIs
                                              • GetExtendedUdpTable.IPHLPAPI(00000000,?,00000001,00000002,00000001,00000000,?,00000000,GetExtendedUdpTable,?,iphlpapi.dll), ref: 100044E9
                                              • GetExtendedUdpTable.IPHLPAPI(?,?,00000001,00000002,00000001,00000000,?,00000000,GetExtendedUdpTable,?,iphlpapi.dll), ref: 10004513
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExtendedTable
                                              • String ID: GetExtendedUdpTable$iphlpapi.dll
                                              • API String ID: 2407854163-1809394930
                                              • Opcode ID: 8f3a0eb883154a3195ca5da507f2da972492a258440e1d6e2132d319b0eaf8e7
                                              • Instruction ID: 6449560a486cb6172ee975f2d37c1f40bf8993c7a1880d61e14318031523e361
                                              • Opcode Fuzzy Hash: 8f3a0eb883154a3195ca5da507f2da972492a258440e1d6e2132d319b0eaf8e7
                                              • Instruction Fuzzy Hash: D1215CB5500508BFEB20DB69DC46EAF77BCDF813D1F214519F9119A086DE30AE808674

                                              Control-flow Graph

                                              APIs
                                              • Sleep.KERNEL32(?,00000800,?,?,?,svchsot.exe,?,?,?,?,00000000,?,?,?), ref: 1000855C
                                              Strings
                                              • U09GVFdBUkVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==, xrefs: 1000846F
                                              • svchsot.exe, xrefs: 10008524
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: U09GVFdBUkVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==$svchsot.exe
                                              • API String ID: 3472027048-2214221337
                                              • Opcode ID: d2131fb9256a9d085b7213a385e4fb7e2e0d0505dace0aeb26e32ec0842a8d4a
                                              • Instruction ID: e8defaa02cb337ec462540d7064ad22b690c993f3d196736069eab589a90189d
                                              • Opcode Fuzzy Hash: d2131fb9256a9d085b7213a385e4fb7e2e0d0505dace0aeb26e32ec0842a8d4a
                                              • Instruction Fuzzy Hash: EE314D7290015DBEEB01DBA4CD81DEFB7FDFB48284F1440A6F644E6105EA30AF858BA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 490 100087b6-100087ea CreateThread Sleep CreateThread Sleep 492 100087eb-100087f2 490->492
                                              APIs
                                              • CreateThread.KERNEL32(?,?,Function_00006A6E), ref: 100087D1
                                              • Sleep.KERNEL32(00001388,?,?,Function_00006A6E), ref: 100087D8
                                              • CreateThread.KERNEL32(?,?,Function_0000841C,?,?,?,?,?,Function_00006A6E), ref: 100087E4
                                              • Sleep.KERNEL32(000000FF,?,?,Function_0000841C,?,?,?,?,?,Function_00006A6E), ref: 100087E8
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CreateSleepThread
                                              • String ID:
                                              • API String ID: 4202482776-0
                                              • Opcode ID: 7611a2c7549d694aa888d6d647670ac1460baf17db733e16608d155f4bf44ca4
                                              • Instruction ID: 2df9746d7e78e8372c6e87ac4aa0691d1060a96339f5c4ce5d4c7b8b7a8da0f8
                                              • Opcode Fuzzy Hash: 7611a2c7549d694aa888d6d647670ac1460baf17db733e16608d155f4bf44ca4
                                              • Instruction Fuzzy Hash: 46E05EE024435DBDF321B2791CC8DFF1E0DEB812FCB254252F528100CB6A540D048AB2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 494 10006b1f-10006b5f call 1002005c call 10003ece GetLastError 499 10006b90-10006bc0 call 1002a5e7 call 10038e15 494->499 500 10006b61-10006b8e CreateThread call 1002420a call 1002ab9b Sleep 494->500 510 10006bc2-10006bc5 499->510 511 10006bca-10006bcf 499->511 512 10006c66-10006c68 510->512 513 10006bd5-10006bd6 511->513 514 10006c56-10006c65 call 1000ccf2 511->514 516 10006bd9-10006be3 513->516 514->512 518 10006be5-10006be9 516->518 519 10006beb-10006bf1 516->519 518->519 520 10006bf3-10006bf7 519->520 521 10006bf9-10006c3a 519->521 520->521 522 10006c40-10006c45 521->522 523 10006c3c 521->523 524 10006c47 522->524 525 10006c4b-10006c50 522->525 523->522 524->525 525->516 526 10006c52-10006c55 525->526 526->514
                                              APIs
                                                • Part of subcall function 10003ECE: CreateMutexA.KERNEL32(?,?,?,10006B50,?,?,?,00000202,?), ref: 10003EDA
                                              • GetLastError.KERNEL32 ref: 10006B55
                                              • CreateThread.KERNEL32(?,?,1000687E), ref: 10006B6B
                                              • Sleep.KERNEL32(00002710,?,00000000,00000000,000000FF,?,?,1000687E), ref: 10006B88
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Create$ErrorLastMutexSleepThread
                                              • String ID:
                                              • API String ID: 145085098-0
                                              • Opcode ID: 9fdb200d5929ef7e8f6a96f443088d0c96ecfb43422a1e838647d38a76ea70c1
                                              • Instruction ID: 4f35827bfa7b5ea93410d600da94e256639eda4c8ceaa52b9f8b13dee9a51c26
                                              • Opcode Fuzzy Hash: 9fdb200d5929ef7e8f6a96f443088d0c96ecfb43422a1e838647d38a76ea70c1
                                              • Instruction Fuzzy Hash: 463182714043905EF716DB284C45EA7BFAEDF5A390B14416AF8A5CB287D620D941C771

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 527 10007101-10007119 call 1000cc9e 530 1000711b-10007160 call 10005c4c 527->530 533 10007162-10007169 530->533 534 1000716b 530->534 535 10007170-100071a4 call 10003ef4 call 1000ccec call 100061bd 533->535 534->535 542 100071a6-100071b2 Sleep 535->542 543 100071b7-100071bb 535->543 542->530 544 100071d9-100071e3 call 1000ccf2 543->544 545 100071bd-100071c7 543->545 544->542 551 100071e5-100071f5 call 1000cde2 544->551 546 100071c9-100071cd 545->546 547 100071cf 545->547 549 100071d3-100071d7 546->549 547->549 549->544 549->545 551->542 554 100071f7-1000720c wsprintfA call 1000570f 551->554 554->542
                                              APIs
                                              Strings
                                              • http://107.160.131.254:23588/article.php, xrefs: 1000716B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleepwsprintf
                                              • String ID: http://107.160.131.254:23588/article.php
                                              • API String ID: 1749205058-3833642815
                                              • Opcode ID: 97092958d065cc5244b5ac70b0ba84f38b29928c2b3a7baf181ba609d4b8ef37
                                              • Instruction ID: aabc6cc0ccec88c78b37051fa20fdae4f9ca8aa4d7268392f08ad21868547801
                                              • Opcode Fuzzy Hash: 97092958d065cc5244b5ac70b0ba84f38b29928c2b3a7baf181ba609d4b8ef37
                                              • Instruction Fuzzy Hash: 462129B6D046557AF724D368CC56FCF37ACEF053D0F2000A6F608A50C6E679AE818A11
                                              APIs
                                                • Part of subcall function 10003F0A: InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 10003F1C
                                              • ___crtGetTimeFormatEx.LIBCMT ref: 10006201
                                              Strings
                                              • TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1, xrefs: 100061D0
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: FormatInternetOpenTime___crt
                                              • String ID: TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1
                                              • API String ID: 483802873-1756078650
                                              • Opcode ID: 82af1a15f59e1fdef4f373340f409e9f860dae93766629ca999b654561017b81
                                              • Instruction ID: f0c3526304c825564c5c4eb44b26f53dc373e74deb03e814873fed5b313e77ee
                                              • Opcode Fuzzy Hash: 82af1a15f59e1fdef4f373340f409e9f860dae93766629ca999b654561017b81
                                              • Instruction Fuzzy Hash: 1C21C575D0014DBAEF21DB55DC45D9F7B7DDB852D0F20807AF608E6045DA319A818660
                                              APIs
                                                • Part of subcall function 10003F0A: InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 10003F1C
                                              • ___crtGetTimeFormatEx.LIBCMT ref: 100062BF
                                                • Part of subcall function 10003F24: InternetOpenUrlA.WININET(80000100,00000000,00000000,00000000,00000000,10006206), ref: 10003F39
                                              Strings
                                              • TW96aWxsYS80LjAgKGNvbXBhdGlibGUp, xrefs: 10006298
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: InternetOpen$FormatTime___crt
                                              • String ID: TW96aWxsYS80LjAgKGNvbXBhdGlibGUp
                                              • API String ID: 1165476586-1918919809
                                              • Opcode ID: 5c4a45e9f88b1cdcaa63395fc832ffbcbaa15b587116e0ae30a38edddbb0ae5c
                                              • Instruction ID: e1df23a7d6fc88136f19512af0817ca3ec1a39d4f872029b50130054e15d899c
                                              • Opcode Fuzzy Hash: 5c4a45e9f88b1cdcaa63395fc832ffbcbaa15b587116e0ae30a38edddbb0ae5c
                                              • Instruction Fuzzy Hash: 61E0D832D089D238BA33E1671C0ED9F1EBDCBC7AF0B71402DF9489100EE8556485C0B5
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: C:\Program Files
                                              • API String ID: 3472027048-1387799010
                                              • Opcode ID: ef70be951d54eb09da497d03d6b876b815efcf974a7af6f3814c100205ad0eea
                                              • Instruction ID: c9703108929f2dc2805788eab40c91aa3f5a92b87bc929f4f41ff718cce9746c
                                              • Opcode Fuzzy Hash: ef70be951d54eb09da497d03d6b876b815efcf974a7af6f3814c100205ad0eea
                                              • Instruction Fuzzy Hash: 40F0723A905AA1A6F701DFA409C068B776DFF022A0B210026F840BF047C7B18E0243E2
                                              APIs
                                              • RegCreateKeyExA.KERNEL32(?,00000000,000F003F,00000000,?,00000000,00000000,80000001,10006D60,?,10006D60,80000001,00000000,00000000,REG_SZ,00000000), ref: 1000408A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 8241c048834319a8777681939fd791c1f2bb79611796acde0cc24ef85fc7be79
                                              • Instruction ID: 2e24eff2bcdac0d7bb79d22e3b0edd8e416dbe054c2d5b18b585679418e55d12
                                              • Opcode Fuzzy Hash: 8241c048834319a8777681939fd791c1f2bb79611796acde0cc24ef85fc7be79
                                              • Instruction Fuzzy Hash: 8DD0AE3200014EFBCF025F81ED05CDA3F6AFB0C2A9B068254FA1825030C777D9B1AB91
                                              APIs
                                              • RegOpenKeyExA.KERNEL32(?,?,?,?,?), ref: 100040CC
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: a195baf415497c3f6e756206114371a6254dc762b0ba02df47c96a08b610d07e
                                              • Instruction ID: 17287b262fc42a8ef4c3757039caf17c8ec33028492a73a8645d3109de99ba33
                                              • Opcode Fuzzy Hash: a195baf415497c3f6e756206114371a6254dc762b0ba02df47c96a08b610d07e
                                              • Instruction Fuzzy Hash: 40C0013200420EFBCF025F81EC058DA3F2AFB082A1B008010FE1804030C773D9B1EBA1
                                              APIs
                                              • InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 10003F1C
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: InternetOpen
                                              • String ID:
                                              • API String ID: 2038078732-0
                                              • Opcode ID: 8fdbf6ddd27a1d6b462f044f687e1b09091a90aa3cf3341bbc8376c5064c6b07
                                              • Instruction ID: b95a3e5d4d1581b579a43ffb785aa3053a804adf9b6b5080047aec5b24f95343
                                              • Opcode Fuzzy Hash: 8fdbf6ddd27a1d6b462f044f687e1b09091a90aa3cf3341bbc8376c5064c6b07
                                              • Instruction Fuzzy Hash: 32C0013200020EFBCF025F81EC058DA7F2AFB092A0B008010FA1804031C733D971AB95
                                              APIs
                                              • CreateMutexA.KERNEL32(?,?,?,10006B50,?,?,?,00000202,?), ref: 10003EDA
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CreateMutex
                                              • String ID:
                                              • API String ID: 1964310414-0
                                              • Opcode ID: f03030767440787e5e8ee563cbeb237b89049fd46284869140ae0419c91515a8
                                              • Instruction ID: 0bba5641deb9fc7c6708226b57f3740a3060a6e77b98bc1f4937df3feb83fb0f
                                              • Opcode Fuzzy Hash: f03030767440787e5e8ee563cbeb237b89049fd46284869140ae0419c91515a8
                                              • Instruction Fuzzy Hash: 51B0093A408220BFDF025F90DD4880ABBA2BB88362F24C958F6A941031C7328420EB02
                                              APIs
                                              • GetShortPathNameA.KERNEL32(?,?,?), ref: 10004003
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: NamePathShort
                                              • String ID:
                                              • API String ID: 1295925010-0
                                              • Opcode ID: b2e0d57d01f7aa481c28775ec103b2c79e6903a2f37fda92ba0980fa6487b9be
                                              • Instruction ID: 299f2b121c0b8d63d2f16659a91a8a26a6eb1e7383ee0b7c2fbbf344de06ce20
                                              • Opcode Fuzzy Hash: b2e0d57d01f7aa481c28775ec103b2c79e6903a2f37fda92ba0980fa6487b9be
                                              • Instruction Fuzzy Hash: BCB0097A509210BFDF025B91DE4880ABBA2AB89321F10C958F2A940031C7328520EB12
                                              APIs
                                              • Process32First.KERNEL32(00000000,00000000), ref: 1000410C
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: FirstProcess32
                                              • String ID:
                                              • API String ID: 2623510744-0
                                              • Opcode ID: 4be810b948c5642b78a3303991c31d5753e2f497cabb41971bfbf009a223d646
                                              • Instruction ID: d0469a6573cf8832cc4e791a541241725128130187f64684ac8c75673cb250d8
                                              • Opcode Fuzzy Hash: 4be810b948c5642b78a3303991c31d5753e2f497cabb41971bfbf009a223d646
                                              • Instruction Fuzzy Hash: B8A00176509612ABDA42AB51CE4884ABEA2FBA8381F01C819F18940434CB3284A5EB12
                                              APIs
                                              • Process32Next.KERNEL32(00000000,00000000), ref: 1000411D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: NextProcess32
                                              • String ID:
                                              • API String ID: 1850201408-0
                                              • Opcode ID: 96d6b844675e51e99f82aec0d05e68cf0a3385db677bffcb7afb410fd8c547f0
                                              • Instruction ID: 2ceb7d0ae5350f2ffb1294a1e21229299d690b4e3dcfc0507f8b466183483048
                                              • Opcode Fuzzy Hash: 96d6b844675e51e99f82aec0d05e68cf0a3385db677bffcb7afb410fd8c547f0
                                              • Instruction Fuzzy Hash: B1A00136408612ABDA42AB50CD4884ABEA2FBA8381F11C819F18941034CB3684A5EB12
                                              APIs
                                              • GetDriveTypeA.KERNEL32(?,1000824C,10015940), ref: 1000400E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: DriveType
                                              • String ID:
                                              • API String ID: 338552980-0
                                              • Opcode ID: 2ee3dedfe077572030ca3591167bf26a544b4eb7bba9e94adf73c1260513ac4d
                                              • Instruction ID: e310fc801df329cbdffcf5e880badee8d9e0b58f708c6ac467addbfbb1e58057
                                              • Opcode Fuzzy Hash: 2ee3dedfe077572030ca3591167bf26a544b4eb7bba9e94adf73c1260513ac4d
                                              • Instruction Fuzzy Hash: 029002305055119BDE015B10CE4940A7E71AB84701B00C4A4E04541130C7328810EE01
                                              APIs
                                              • RegCloseKey.KERNEL32(?,10006DBE,?), ref: 10004096
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Close
                                              • String ID:
                                              • API String ID: 3535843008-0
                                              • Opcode ID: 2d988dbd5b15decafcf846d532543195a702f6c68f6a27351b5815321025a744
                                              • Instruction ID: c461232d01f39555025ee1551a6f08c036cd225bd5518e59674b318f5e785400
                                              • Opcode Fuzzy Hash: 2d988dbd5b15decafcf846d532543195a702f6c68f6a27351b5815321025a744
                                              • Instruction Fuzzy Hash: 799002705055119BDE415B11CF494097AA5AB84701B008458E04A41030C7318810EA01
                                              APIs
                                              • gethostbyname.WS2_32(00000000), ref: 10003EB8
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: gethostbyname
                                              • String ID:
                                              • API String ID: 930432418-0
                                              • Opcode ID: dcfbcd4351272649fb1253f470343220905ed4c20dbbca1a40d0a1126bf3fd71
                                              • Instruction ID: ddc175de635f80408d7ee48a1059bf0ffdd1ba2c9e36570999931cb834b2f0bc
                                              • Opcode Fuzzy Hash: dcfbcd4351272649fb1253f470343220905ed4c20dbbca1a40d0a1126bf3fd71
                                              • Instruction Fuzzy Hash: F7900270545110ABDE015B21CF4A4097A61AB85B01B048454E14940031C7318810EA12
                                              APIs
                                              • PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,C:\Users\user\Desktop,?,00000000,00080000), ref: 10003F76
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExistsFilePath
                                              • String ID:
                                              • API String ID: 1174141254-0
                                              • Opcode ID: 6dc1e466dda3ac71b59e7395498c1fa1529f77b3beb14a38e7d5df6994b7eb4f
                                              • Instruction ID: df56204a28902bd86cd8e7b59e1535f4ff11cbe2af3c274bf077f84441daad3a
                                              • Opcode Fuzzy Hash: 6dc1e466dda3ac71b59e7395498c1fa1529f77b3beb14a38e7d5df6994b7eb4f
                                              • Instruction Fuzzy Hash: 869002705051109BDF015B11CF494497A65AB84701B00855CF05A41431C7318910EA01
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: K
                                              • API String ID: 0-856455061
                                              • Opcode ID: 2579a251d1a9acc8374f22f67a4bb7b2891299b7fe2be1df8caa295a5f0ee3c9
                                              • Instruction ID: 6c5504f13a17a8b4553fb93f6e314e3eb43bbcef24ba1366296fc093faca9512
                                              • Opcode Fuzzy Hash: 2579a251d1a9acc8374f22f67a4bb7b2891299b7fe2be1df8caa295a5f0ee3c9
                                              • Instruction Fuzzy Hash: 13D1F2311046896EDB21CFAC8C80EFFBBBCAF4AA40F840549FD85CB642D555E92DA771
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: K
                                              • API String ID: 0-856455061
                                              • Opcode ID: 40533ac75a34c0e28785cd811d3dcb55fe45dda3d4d2e35189a70ffc9c8f5c8e
                                              • Instruction ID: a9c7f45465d92fcd6248bf8d3b75336943ce7982e690b294f387925eaf45448f
                                              • Opcode Fuzzy Hash: 40533ac75a34c0e28785cd811d3dcb55fe45dda3d4d2e35189a70ffc9c8f5c8e
                                              • Instruction Fuzzy Hash: 6F9143311046896EDB21CFAD8C80EFFBBBCAF06A40F840549FE85C7642D255E92DA771
                                              APIs
                                              • InternetReadFile.WININET(?,?,?,?), ref: 10003F51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: FileInternetRead
                                              • String ID:
                                              • API String ID: 778332206-0
                                              • Opcode ID: 17794e789735475d89bbd1f9c593eb9d99e0ec2b66a06d8a24d179cffc3f724c
                                              • Instruction ID: 66c4406e5843dae4aa23aa47ff20fa86481cf42106c3819bfbf8a2f6b8e79ef1
                                              • Opcode Fuzzy Hash: 17794e789735475d89bbd1f9c593eb9d99e0ec2b66a06d8a24d179cffc3f724c
                                              • Instruction Fuzzy Hash: 20B00872519392ABDF02DF91CD4482ABAA6BB89301F084C5CF2A540071C7328428EB02
                                              APIs
                                              • ExitWindowsEx.USER32(000000BC,000000BC), ref: 10003F6B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExitWindows
                                              • String ID:
                                              • API String ID: 1089080001-0
                                              • Opcode ID: ddd05c4d22fa51185853cbc8baa1bf28f6a18d545d76c7cc1a4f4cf3c1112b8e
                                              • Instruction ID: a0a7e03ceb7acd9bb0d3454ea8bb5ca0f40435505fc546ba40186378cb909d0a
                                              • Opcode Fuzzy Hash: ddd05c4d22fa51185853cbc8baa1bf28f6a18d545d76c7cc1a4f4cf3c1112b8e
                                              • Instruction Fuzzy Hash: 81A00175509222EBDE025B51CE4888ABEA6AB88381F008858F28940031C77284A2EB02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: '
                                              • API String ID: 0-1997036262
                                              • Opcode ID: 5e1b7fa75d798f3fa9518893cf7255a08fd4602d24c853d58b87a38f934e217c
                                              • Instruction ID: f389f15fd0a8877f73eb6a91fb6ffbaafb7a2d8a217a3cbe01a0a4cb358a3832
                                              • Opcode Fuzzy Hash: 5e1b7fa75d798f3fa9518893cf7255a08fd4602d24c853d58b87a38f934e217c
                                              • Instruction Fuzzy Hash: 5581276940E3D19FC7438B785CF91823FA2AE1B24434F09DAC4C09F4B7E1995D49C7A2
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5eebda9e14e432eb1eff53421c5c1b8c098bdb1a5ff6e099d7d67764739a7ad5
                                              • Instruction ID: 9e0b5d620d62c11970e9cc848d1ca02f4ed839136e4bfa4bb83daef4b24ba54e
                                              • Opcode Fuzzy Hash: 5eebda9e14e432eb1eff53421c5c1b8c098bdb1a5ff6e099d7d67764739a7ad5
                                              • Instruction Fuzzy Hash: AA313A33E2C6B607E324DF7E4C84025F7D6EB8A06275A8779DE88E7255D128EC518BD0
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e333d78722ad0821d4e98b6652e5a75445b5621be3666c330cc0561f1e3ae06e
                                              • Instruction ID: 9deb1ace0ade157a7cf376dc79b16b2541233208deadd1a3cef8bf08dc3f5488
                                              • Opcode Fuzzy Hash: e333d78722ad0821d4e98b6652e5a75445b5621be3666c330cc0561f1e3ae06e
                                              • Instruction Fuzzy Hash: 43F0682128E3C15DE30186685441BC1FF846B76314F0CC7CDB1D40B283C1954084CBA6
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 12b9005d6082dbdac1a2845a9fd333a3e7a79171a5b874446ea0314262c5ac30
                                              • Instruction ID: f0cb1bca0584f7cb9865d2b0003cd1252f49916ae924d73bcd8c513b2b9b2d6d
                                              • Opcode Fuzzy Hash: 12b9005d6082dbdac1a2845a9fd333a3e7a79171a5b874446ea0314262c5ac30
                                              • Instruction Fuzzy Hash: 11E0E5A440C38AFEC703AB3488840E93FA6EE91310F04840CF4C403A02E3B589A09332
                                              APIs
                                              • SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 10007338
                                              • VariantInit.OLEAUT32(?), ref: 1000734D
                                              • SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 10007368
                                              • VariantInit.OLEAUT32(?), ref: 10007377
                                                • Part of subcall function 10007A62: VariantInit.OLEAUT32(?), ref: 10007AA1
                                              • SafeArrayCreate.OLEAUT32(00000008,00000001,00000002), ref: 10007505
                                              • VariantInit.OLEAUT32(?), ref: 10007513
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: InitVariant$ArrayCreateSafe
                                              • String ID: DNSServerSearchOrder$DefaultIPGateway$GatewayCostMetric$IPEnabled=TRUE$Index$SetDNSServerSearchOrder$SetGateways$Win32_NetworkAdapterConfiguration$Win32_NetworkAdapterConfiguration.Index=$p=<u
                                              • API String ID: 2640012081-3655912496
                                              • Opcode ID: 12229ab9ea9be2b5515b3a4e7304c5cbd28c893a32b3e86cd77fead74930fbe5
                                              • Instruction ID: ecf29a1c47d91b81846b45f5da98bbb69cd4e5f42de0d6ad34227a81938465a8
                                              • Opcode Fuzzy Hash: 12229ab9ea9be2b5515b3a4e7304c5cbd28c893a32b3e86cd77fead74930fbe5
                                              • Instruction Fuzzy Hash: DAD17E70D00209EFEB15CFA4C8809EEBBB8FF49780F104419F419AB259DB75AA45CFA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: wsprintf
                                              • String ID: %s\%s$%s\version.txt$12010043$12010043$C:\Users\user\Desktop$C:\Users\user\Desktop\12010043$C:\Users\user\Desktop\Vb1S2HJcnN.dll$C:\Users\user\Desktop\version.txt$C:\Windows\SysWOW64\rundll32.exe$ECF4BBEA1588$M%s$Mhost123.zz.am:6658$host123.zz.am:6658
                                              • API String ID: 2111968516-2065402243
                                              • Opcode ID: 857beac2df9e912fa28a8a8c5910c135d4b4ee4941f056ece51d960c3556155a
                                              • Instruction ID: 32e0762688fea209a997a92a9e142d3ada4c65c650573aee4fc5e34dd7d3b294
                                              • Opcode Fuzzy Hash: 857beac2df9e912fa28a8a8c5910c135d4b4ee4941f056ece51d960c3556155a
                                              • Instruction Fuzzy Hash: 961159356007197BF210E7919C45F5F7E9CDF896A6F01021DFB01AE181DB76F9818A72
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 10004EC5
                                              • VariantInit.OLEAUT32(?), ref: 10004ECB
                                              • VariantInit.OLEAUT32(?), ref: 10004ED1
                                              • VariantInit.OLEAUT32(?,?,?,?,?,?,?,?,?,10016AD0,00000000,00080000), ref: 10005009
                                              • VariantInit.OLEAUT32(?,?,?,?,?,?,?,?,?,10016AD0,00000000,00080000), ref: 1000500F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: InitVariant
                                              • String ID: CommandLine$Name$ProcessID$SELECT * FROM $WQL$p=<u$svchost.exe$svchost.exe -k NetworkService
                                              • API String ID: 1927566239-3501905436
                                              • Opcode ID: b6f3bf19f9a655f11ce33ea3d1eef9f97ff5ff13253a98ebad0314bfa4936779
                                              • Instruction ID: f681daf1cfe066dfb2c65bb1802d225618d831e3fba353d21c944956626e3e16
                                              • Opcode Fuzzy Hash: b6f3bf19f9a655f11ce33ea3d1eef9f97ff5ff13253a98ebad0314bfa4936779
                                              • Instruction Fuzzy Hash: 23A159B1900209AFEB04DFA4CC81DEEBBBDEF48394F104569F515AB295DB31AE45CB60
                                              APIs
                                              • wsprintfA.USER32 ref: 1000574F
                                              • wsprintfA.USER32 ref: 100057B1
                                              • wsprintfA.USER32 ref: 100057C5
                                              • PrintFile.VB1S2HJCNN(?,?,00000000,?,?,?,?,?,?,?,10016AD0,00000000,00080000,?,1000720C), ref: 100057E8
                                              • CreateThread.KERNEL32(00000000,00000000,10005620,00000000,00000000,00000000), ref: 10005835
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: wsprintf$CreateFilePrintThread
                                              • String ID: %s\%s$ROOT\CIMv2$Win32_process$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s
                                              • API String ID: 1788855648-1421401311
                                              • Opcode ID: ae8518da5cd223e832b712c6548c98f9a89997a3f3d4d6029e7fac4c4bf50c1f
                                              • Instruction ID: 590dfccee83cd698aee2aff2a0aef7bd89598b4f0e32949fa848c193a7d694e7
                                              • Opcode Fuzzy Hash: ae8518da5cd223e832b712c6548c98f9a89997a3f3d4d6029e7fac4c4bf50c1f
                                              • Instruction Fuzzy Hash: 0531EA72910238BBEB21D7A4CC45FCF7B6CEB08356F0404A6F708FA051DB75AA858A91
                                              APIs
                                              • wsprintfA.USER32 ref: 10005437
                                              • wsprintfA.USER32 ref: 1000549E
                                              • wsprintfA.USER32 ref: 100054BC
                                              • PrintFile.VB1S2HJCNN(?,?,10016594,?,00000000), ref: 100054DE
                                              • wsprintfA.USER32 ref: 10005582
                                              • Sleep.KERNEL32(000003E8,00000000,75BF8400,?,40000000,00000001,00000000,00000002,00000000,00000000,7598C650,?,?,00000009,00000000,10016594), ref: 100055AE
                                              Strings
                                              • %s\%s, xrefs: 10005431
                                              • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz, xrefs: 100054A9
                                              • c:\windows\system32\drivers\%s, xrefs: 10005498
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: wsprintf$FilePrintSleep
                                              • String ID: %s\%s$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz$c:\windows\system32\drivers\%s
                                              • API String ID: 518940211-4228670124
                                              • Opcode ID: c361d524b353549e0f38205e8cfe1225c09218ba4335209976bd8a7148bd2516
                                              • Instruction ID: 3567043749f32881e03762bb9a57e308b600a04db8eea4acb5e64ce7ea9520bd
                                              • Opcode Fuzzy Hash: c361d524b353549e0f38205e8cfe1225c09218ba4335209976bd8a7148bd2516
                                              • Instruction Fuzzy Hash: 9751C272900658BFEB11CB68CC45FEE73ADEB48341F1404A5FA08AB191DBB1FE858B50
                                              APIs
                                              • Sleep.KERNEL32(?,?,?,cmd.exe), ref: 100043A6
                                              • Sleep.KERNEL32(000003E8), ref: 100043E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==$QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==$cmd.exe$self
                                              • API String ID: 3472027048-2620343502
                                              • Opcode ID: 3f59aa8a2a531e52e96b689b157fed57f8b0b4aca2b36427f54941e0ecbe5060
                                              • Instruction ID: 2962837d3e63ffe82077fec71eea4cc39f059f6aab2461bdb2792d37a05628b4
                                              • Opcode Fuzzy Hash: 3f59aa8a2a531e52e96b689b157fed57f8b0b4aca2b36427f54941e0ecbe5060
                                              • Instruction Fuzzy Hash: 370126BA000394BAFB12BB74EC46F9E3B5CDF452E2F120016F9446D086CEB5AA804565
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000001,SeShutdownPrivilege,00000001,00000000,00000000,?,000000BC,00000000,?,000000BC,00000000,?,00000128,00000000), ref: 10005F21
                                                • Part of subcall function 10004126: OpenProcessToken.ADVAPI32(00000028,00000028,00000028,10005F32,00000000,00000028,00000000,00000001,SeShutdownPrivilege,00000001,00000000,00000000,?,000000BC,00000000,?), ref: 10004132
                                                • Part of subcall function 100040F1: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,00000000), ref: 100040FD
                                              • ___crtGetTimeFormatEx.LIBCMT ref: 10005F79
                                                • Part of subcall function 1000404F: AdjustTokenPrivileges.ADVAPI32(00000000,00000010,?,00000000,00000000,10005F7E,?,10005F7E,00000000,00000000,?,00000010,00000000,00000000), ref: 10004064
                                              • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005FD4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ProcessTimerToken$AdjustConcurrency::details::platform::__CreateCurrentFormatLookupOpenPrivilegePrivilegesQueueTimeValue___crt
                                              • String ID: %s\lang.ini$C:\Users\user\Desktop
                                              • API String ID: 3793502078-1738621931
                                              • Opcode ID: 4c2164c536502c8c7bf62064663df8d628c4358b27154a1aa27f72d12e264788
                                              • Instruction ID: ec7a4272703c46c275716bc18e38bfb45c62e376eb564a1a1e1e8047e794edd2
                                              • Opcode Fuzzy Hash: 4c2164c536502c8c7bf62064663df8d628c4358b27154a1aa27f72d12e264788
                                              • Instruction Fuzzy Hash: FE21BDB6D00119BEEB10DAA4CC02FEF7BBCDF04790F104021FA04E6185EA75AB809AE1
                                              APIs
                                                • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,C:\Users\user\Desktop,?,00000000,00080000), ref: 10003F76
                                              • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005D61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
                                              • String ID: %s\lang.ini$C:\Users\user\Desktop$http://$search
                                              • API String ID: 1721638100-2283769073
                                              • Opcode ID: d1da8393b741fbea104cea0a346650b348cc7a6ae7d15635f455682e2727de3c
                                              • Instruction ID: d10eea2e68a17fc7dae01a0a692719cf89fcc4e95e635f9962b470bf74251c26
                                              • Opcode Fuzzy Hash: d1da8393b741fbea104cea0a346650b348cc7a6ae7d15635f455682e2727de3c
                                              • Instruction Fuzzy Hash: D81106769081197FFB61DAA4CC42FDB776CDB143D5F1045B2FB48A9080EA72AFC44A60
                                              APIs
                                                • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,C:\Users\user\Desktop,?,00000000,00080000), ref: 10003F76
                                              • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005CB6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
                                              • String ID: %s\lang.ini$C:\Users\user\Desktop$http://
                                              • API String ID: 1721638100-2510504628
                                              • Opcode ID: 354cb08d00e8bc516f166db664e2c84127a23412515739fcecc10b8ce6ebd26b
                                              • Instruction ID: 275623b6bb4d38d455d16e038d1f67d5d5eba5b08857937f3fa6caa2442e2442
                                              • Opcode Fuzzy Hash: 354cb08d00e8bc516f166db664e2c84127a23412515739fcecc10b8ce6ebd26b
                                              • Instruction Fuzzy Hash: 131104769041197EFB21DAA4CC42FDB776CDB14384F0085B1FA48B6080EA71AF884660
                                              APIs
                                              Strings
                                              • C:\Users\user\Desktop, xrefs: 1000880B
                                              • Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=, xrefs: 10008810
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Sleepwsprintf
                                              • String ID: C:\Users\user\Desktop$Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=
                                              • API String ID: 1749205058-3359968284
                                              • Opcode ID: d826f062264427af496b9675ff0d63a37454a8e3147eb2671c5731483726d261
                                              • Instruction ID: cb8f3af107b47666e7401f40fe0349a9d09f1feb376e898973d7629cffdb37cc
                                              • Opcode Fuzzy Hash: d826f062264427af496b9675ff0d63a37454a8e3147eb2671c5731483726d261
                                              • Instruction Fuzzy Hash: 00F0AEF250019DABEB15CBA4CC857EA3768FF04285F040975F705F5051DBB19AC44A55
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: InitVariant
                                              • String ID: $p=<u
                                              • API String ID: 1927566239-2520713026
                                              • Opcode ID: d0ca9816adfda9363097ead228823b8de7426d0966cf0e74972078de5e0d5c66
                                              • Instruction ID: ef89c2eb01536c9538a48ebd5608185a951f11054c82c4a53c762a0a2007c409
                                              • Opcode Fuzzy Hash: d0ca9816adfda9363097ead228823b8de7426d0966cf0e74972078de5e0d5c66
                                              • Instruction Fuzzy Hash: AB41A475D002599FEF14DFA4C884AEEB7F8FF05284F10446DE91AA3245DB38AE48CB61
                                              APIs
                                              • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005FD4
                                                • Part of subcall function 10004015: CreateFileA.KERNEL32(00000080,00000003,00000000,00000000,80000000,?,10005CBB,?,10005CBB,?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 1000402D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.4203226496.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.4203200212.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203265128.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203306292.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203338072.000000001001E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203372330.000000001003D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.4203418013.000000001004F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CreateTimer$Concurrency::details::platform::__FileQueue
                                              • String ID: %s\lang.ini$C:\Users\user\Desktop
                                              • API String ID: 3486561800-1738621931
                                              • Opcode ID: b1726d4115c593d66bb357bf89ab1e7ee1f9c93add6e05033f4287082a534528
                                              • Instruction ID: 2e9b22e8cb94d114ab57fa925500967999958ebf182bde47e5e7f2d31677baea
                                              • Opcode Fuzzy Hash: b1726d4115c593d66bb357bf89ab1e7ee1f9c93add6e05033f4287082a534528
                                              • Instruction Fuzzy Hash: 23E0687290112432E670D1669C07FCF3E9CDB857F4F000220B688E60C4DAB4AAC4C6E0