Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vilxost.dll

Overview

General Information

Sample Name:vilxost.dll
Analysis ID:644616
MD5:0d3ef01e253037c5e3640842ce60aa4c
SHA1:ac4486b15486973d8bfe0b457c04ba252abe1b7c
SHA256:68cf2a424501cace33c3d6c5419057e49f4345c6661e91a6a559888595b387a9
Infos:

Detection

Xmrig
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Malicious sample detected (through community Yara rule)
Found strings related to Crypto-Mining
DNS related to crypt mining pools
Machine Learning detection for sample
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Yara signature match
Sample file is different than original file name gathered from version info
One or more processes crash
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Registers a DLL
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7052 cmdline: loaddll64.exe "C:\Users\user\Desktop\vilxost.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7060 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7080 cmdline: rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 7068 cmdline: regsvr32.exe /s C:\Users\user\Desktop\vilxost.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 7088 cmdline: rundll32.exe C:\Users\user\Desktop\vilxost.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4212 cmdline: rundll32.exe C:\Users\user\Desktop\vilxost.dll,ServiceMain MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 4624 cmdline: C:\Windows\system32\WerFault.exe -u -p 4212 -s 500 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 3360 cmdline: rundll32.exe C:\Users\user\Desktop\vilxost.dll,fackaaxv MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
vilxost.dllMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
  • 0x30e4b0:$x1: donate.ssl.xmrig.com
  • 0x30e7d1:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
  • 0x309240:$s1: [%s] login error code: %d
vilxost.dllJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    vilxost.dllMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
    • 0x30eaa0:$s1: %s/%s (Windows NT %lu.%lu
    • 0x30fd68:$s3: \\.\WinRing0_
    • 0x308fc8:$s4: pool_wallet
    • 0x30ecd0:$s5: cryptonight
    • 0x30ece8:$s5: cryptonight
    • 0x30ecf8:$s5: cryptonight
    • 0x30ed10:$s5: cryptonight
    • 0x30ed28:$s5: cryptonight
    • 0x30ed38:$s5: cryptonight
    • 0x30ed48:$s5: cryptonight
    • 0x30ed60:$s5: cryptonight
    • 0x30ed78:$s5: cryptonight
    • 0x30ed88:$s5: cryptonight
    • 0x30eda0:$s5: cryptonight
    • 0x30edb8:$s5: cryptonight
    • 0x30edd8:$s5: cryptonight
    • 0x30edf0:$s5: cryptonight
    • 0x30ee08:$s5: cryptonight
    • 0x30ee20:$s5: cryptonight
    • 0x30ee30:$s5: cryptonight
    • 0x30ee48:$s5: cryptonight
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpCoinMiner_StringsDetects mining pool protocol string in ExecutableFlorian Roth
    • 0x93008:$sa1: stratum+tcp://
    00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000002.00000002.825421862.000000000138B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000006.00000000.447809749.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpCoinMiner_StringsDetects mining pool protocol string in ExecutableFlorian Roth
        • 0x93008:$sa1: stratum+tcp://
        00000006.00000000.447809749.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          Click to see the 5 entries
          SourceRuleDescriptionAuthorStrings
          6.0.rundll32.exe.7ffa510f0000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
          • 0x30e4b0:$x1: donate.ssl.xmrig.com
          • 0x30e7d1:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
          • 0x309240:$s1: [%s] login error code: %d
          6.0.rundll32.exe.7ffa510f0000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            6.0.rundll32.exe.7ffa510f0000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
            • 0x30eaa0:$s1: %s/%s (Windows NT %lu.%lu
            • 0x30fd68:$s3: \\.\WinRing0_
            • 0x308fc8:$s4: pool_wallet
            • 0x30ecd0:$s5: cryptonight
            • 0x30ece8:$s5: cryptonight
            • 0x30ecf8:$s5: cryptonight
            • 0x30ed10:$s5: cryptonight
            • 0x30ed28:$s5: cryptonight
            • 0x30ed38:$s5: cryptonight
            • 0x30ed48:$s5: cryptonight
            • 0x30ed60:$s5: cryptonight
            • 0x30ed78:$s5: cryptonight
            • 0x30ed88:$s5: cryptonight
            • 0x30eda0:$s5: cryptonight
            • 0x30edb8:$s5: cryptonight
            • 0x30edd8:$s5: cryptonight
            • 0x30edf0:$s5: cryptonight
            • 0x30ee08:$s5: cryptonight
            • 0x30ee20:$s5: cryptonight
            • 0x30ee30:$s5: cryptonight
            • 0x30ee48:$s5: cryptonight
            6.2.rundll32.exe.7ffa510f0000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
            • 0x30e4b0:$x1: donate.ssl.xmrig.com
            • 0x30e7d1:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
            • 0x309240:$s1: [%s] login error code: %d
            6.2.rundll32.exe.7ffa510f0000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Click to see the 4 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: vilxost.dllVirustotal: Detection: 56%Perma Link
              Source: vilxost.dllReversingLabs: Detection: 60%
              Source: vilxost.dllJoe Sandbox ML: detected

              Bitcoin Miner

              barindex
              Source: Yara matchFile source: vilxost.dll, type: SAMPLE
              Source: Yara matchFile source: 6.0.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.rundll32.exe.7ffa510f0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.825421862.000000000138B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.447809749.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.444316937.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7068, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4212, type: MEMORYSTR
              Source: rundll32.exe, 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: stratum+ssl://
              Source: rundll32.exe, 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: cryptonight/0
              Source: rundll32.exe, 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: stratum+tcp://
              Source: rundll32.exe, 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Name:Vendor:versionvendor/.cache/xmrig @blake2b_initial_hashfind_shares -DWORKERS_PER_HASH=hashAes1Rx4fillAes4Rx4_entropyblake2b_hash_registers_32 -DGCN_VERSION=fillAes1Rx4_scratchpadblake2b_hash_registers_64H
              Source: unknownDNS query: name: xmr-us-east1.nanopool.org
              Source: vilxost.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

              Networking

              barindex
              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 142.44.242.100 14433Jump to behavior
              Source: C:\Windows\System32\regsvr32.exeDomain query: xmr-us-east1.nanopool.org
              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 192.99.69.170 14433Jump to behavior
              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 144.217.14.109 14433Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.5:49762 -> 142.44.242.100:14433
              Source: global trafficTCP traffic: 192.168.2.5:49854 -> 144.217.14.109:14433
              Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
              Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
              Source: Joe Sandbox ViewIP Address: 142.44.242.100 142.44.242.100
              Source: regsvr32.exe, 00000002.00000002.825771184.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754384864.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.493862093.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754345067.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.682831252.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.493809926.000000000147C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.682881600.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.622474677.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.555481110.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826250723.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl
              Source: regsvr32.exe, 00000002.00000003.493862093.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl$Q
              Source: regsvr32.exe, 00000002.00000002.825501001.0000000001401000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825613371.0000000001458000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826158917.0000000003030000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754345067.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826250723.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0
              Source: regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crlcat
              Source: regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca
              Source: regsvr32.exe, 00000002.00000002.825501001.0000000001401000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825613371.0000000001458000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825771184.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754384864.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826158917.0000000003030000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754345067.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.493809926.000000000147C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.682881600.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826250723.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca0
              Source: unknownDNS traffic detected: queries for: xmr-us-east1.nanopool.org

              System Summary

              barindex
              Source: vilxost.dll, type: SAMPLEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: vilxost.dll, type: SAMPLEMatched rule: Detects coinmining malware Author: ditekSHen
              Source: 6.0.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: 6.0.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
              Source: 6.2.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: 6.2.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
              Source: 6.0.rundll32.exe.7ffa510f0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: 6.0.rundll32.exe.7ffa510f0000.1.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
              Source: vilxost.dll, type: SAMPLEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: vilxost.dll, type: SAMPLEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
              Source: 6.0.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: 6.0.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
              Source: 6.2.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: 6.2.rundll32.exe.7ffa510f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
              Source: 6.0.rundll32.exe.7ffa510f0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc
              Source: 6.0.rundll32.exe.7ffa510f0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
              Source: 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive =
              Source: 00000006.00000000.447809749.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive =
              Source: 00000006.00000000.444316937.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive =
              Source: Process Memory Space: rundll32.exe PID: 4212, type: MEMORYSTRMatched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive =
              Source: vilxost.dllBinary or memory string: OriginalFilenametest.dllj% vs vilxost.dll
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4212 -s 500
              Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\regsvr32.exeProcess Stats: CPU usage > 98%
              Source: vilxost.dllVirustotal: Detection: 56%
              Source: vilxost.dllReversingLabs: Detection: 60%
              Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1
              Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\vilxost.dll"
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\vilxost.dll
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\vilxost.dll,DllRegisterServer
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\vilxost.dll,ServiceMain
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\vilxost.dll,fackaaxv
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4212 -s 500
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\vilxost.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\vilxost.dll,DllRegisterServerJump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\vilxost.dll,ServiceMainJump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\vilxost.dll,fackaaxvJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1Jump to behavior
              Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\Samplexn07
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4212
              Source: C:\Windows\System32\regsvr32.exeFile created: c:\windows\temp\mal.txtJump to behavior
              Source: classification engineClassification label: mal84.evad.mine.winDLL@14/5@6/4
              Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: vilxost.dllStatic file information: File size 3863040 > 1048576
              Source: vilxost.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: vilxost.dllStatic PE information: Image base 0x180000000 > 0x60000000
              Source: vilxost.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x270a00
              Source: vilxost.dllStatic PE information: More than 200 imports for KERNEL32.dll
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: vilxost.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Source: vilxost.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: vilxost.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: vilxost.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: vilxost.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: vilxost.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: vilxost.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: vilxost.dllStatic PE information: section name: _RANDOMX
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\vilxost.dll
              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 7665Jump to behavior
              Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 2243Jump to behavior
              Source: C:\Windows\System32\loaddll64.exe TID: 7056Thread sleep time: -120000s >= -30000sJump to behavior
              Source: C:\Windows\System32\regsvr32.exe TID: 5768Thread sleep count: 7665 > 30Jump to behavior
              Source: C:\Windows\System32\regsvr32.exe TID: 5768Thread sleep count: 2243 > 30Jump to behavior
              Source: C:\Windows\System32\regsvr32.exe TID: 5768Thread sleep count: 74 > 30Jump to behavior
              Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
              Source: regsvr32.exe, 00000002.00000002.825421862.000000000138B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWI<
              Source: regsvr32.exe, 00000002.00000002.825421862.000000000138B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 142.44.242.100 14433Jump to behavior
              Source: C:\Windows\System32\regsvr32.exeDomain query: xmr-us-east1.nanopool.org
              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 192.99.69.170 14433Jump to behavior
              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 144.217.14.109 14433Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1Jump to behavior
              Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFA51312494 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00007FFA51312494
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              111
              Process Injection
              21
              Virtualization/Sandbox Evasion
              OS Credential Dumping1
              System Time Discovery
              Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
              Non-Standard Port
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              111
              Process Injection
              LSASS Memory11
              Security Software Discovery
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Regsvr32
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Rundll32
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              Remote System Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
              System Information Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 644616 Sample: vilxost.dll Startdate: 13/06/2022 Architecture: WINDOWS Score: 84 32 Malicious sample detected (through community Yara rule) 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Xmrig cryptocurrency miner 2->36 38 3 other signatures 2->38 7 loaddll64.exe 1 2->7         started        process3 process4 9 regsvr32.exe 1 7->9         started        13 rundll32.exe 7->13         started        15 cmd.exe 1 7->15         started        17 2 other processes 7->17 dnsIp5 26 142.44.242.100, 14433, 49762, 49773 OVHFR Canada 9->26 28 144.217.14.109, 14433, 49854 OVHFR Canada 9->28 30 2 other IPs or domains 9->30 40 System process connects to network (likely due to code injection or exploit) 9->40 19 WerFault.exe 20 9 13->19         started        22 rundll32.exe 15->22         started        signatures6 process7 dnsIp8 24 192.168.2.1 unknown unknown 19->24

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              vilxost.dll57%VirustotalBrowse
              vilxost.dll61%ReversingLabsWin64.Trojan.Miner
              vilxost.dll100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              xmr-us-east1.nanopool.org
              144.217.14.139
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://crl.cloudflare.com/origin_ca.crl0regsvr32.exe, 00000002.00000002.825501001.0000000001401000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825613371.0000000001458000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826158917.0000000003030000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754345067.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826250723.0000000003039000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://ocsp.cloudflare.com/origin_caregsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://crl.cloudflare.com/origin_ca.crlcatregsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://ocsp.cloudflare.com/origin_ca0regsvr32.exe, 00000002.00000002.825501001.0000000001401000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825613371.0000000001458000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825771184.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754384864.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826158917.0000000003030000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754345067.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.493809926.000000000147C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.682881600.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826250723.0000000003039000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.cloudflare.com/origin_ca.crl$Qregsvr32.exe, 00000002.00000003.493862093.0000000003039000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://crl.cloudflare.com/origin_ca.crlregsvr32.exe, 00000002.00000002.825771184.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754384864.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.493862093.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.754345067.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.682831252.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.493809926.000000000147C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.682881600.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.622474677.0000000003039000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000003.555481110.000000000147E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.825745941.0000000001474000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.826250723.0000000003039000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            192.99.69.170
                            unknownCanada
                            16276OVHFRtrue
                            142.44.242.100
                            unknownCanada
                            16276OVHFRtrue
                            144.217.14.109
                            unknownCanada
                            16276OVHFRtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:35.0.0 Citrine
                            Analysis ID:644616
                            Start date and time: 13/06/202217:07:382022-06-13 17:07:38 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 7m 47s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:vilxost.dll
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Run name:Run with higher sleep bypass
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal84.evad.mine.winDLL@14/5@6/4
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 100% (good quality ratio 0%)
                            • Quality average: 0%
                            • Quality standard deviation: 0%
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .dll
                            • Adjust boot time
                            • Enable AMSI
                            • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                            • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 23.54.113.53, 104.208.16.94, 40.125.122.176, 52.242.101.226, 20.54.89.106, 20.223.24.244, 52.152.110.14
                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, e12564.dspb.akamaiedge.net, licensing.mp.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net, onedsblobprdcus16.centralus.cloudapp.azure.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                            • Execution Graph export aborted for target rundll32.exe, PID 4212 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            192.99.69.170vilxost.dllGet hashmaliciousBrowse
                              dllhost.exeGet hashmaliciousBrowse
                                4rC1bQcnl5.exeGet hashmaliciousBrowse
                                  csrss.exeGet hashmaliciousBrowse
                                    142.44.242.100vilxost.dllGet hashmaliciousBrowse
                                      LZF5sOWnss.exeGet hashmaliciousBrowse
                                        4HoFnQosUb.exeGet hashmaliciousBrowse
                                          qhgv3aRzkZ.exeGet hashmaliciousBrowse
                                            notepad.exeGet hashmaliciousBrowse
                                              notepad.exeGet hashmaliciousBrowse
                                                RcyatUBgOo.exeGet hashmaliciousBrowse
                                                  xS9h6XCLaY.exeGet hashmaliciousBrowse
                                                    144.217.14.109vilxost.dllGet hashmaliciousBrowse
                                                      RuntimeBroker.exeGet hashmaliciousBrowse
                                                        zIrx1wUddJ.exeGet hashmaliciousBrowse
                                                          E91sLsvV8S.exeGet hashmaliciousBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            xmr-us-east1.nanopool.orgdllhost.exeGet hashmaliciousBrowse
                                                            • 192.99.69.170
                                                            4rC1bQcnl5.exeGet hashmaliciousBrowse
                                                            • 144.217.14.139
                                                            LZF5sOWnss.exeGet hashmaliciousBrowse
                                                            • 144.217.14.139
                                                            4HoFnQosUb.exeGet hashmaliciousBrowse
                                                            • 142.44.242.100
                                                            P7Oa6i5muL.exeGet hashmaliciousBrowse
                                                            • 142.44.242.100
                                                            H9QnI1DbC1.exeGet hashmaliciousBrowse
                                                            • 144.217.14.139
                                                            7xhLwiPIrR.exeGet hashmaliciousBrowse
                                                            • 142.44.243.6
                                                            qhgv3aRzkZ.exeGet hashmaliciousBrowse
                                                            • 144.217.14.139
                                                            zIrx1wUddJ.exeGet hashmaliciousBrowse
                                                            • 142.44.242.100
                                                            E91sLsvV8S.exeGet hashmaliciousBrowse
                                                            • 142.44.243.6
                                                            SecuriteInfo.com.Trojan.GenericKD.46284216.26505.exeGet hashmaliciousBrowse
                                                            • 144.217.14.109
                                                            notepad.exeGet hashmaliciousBrowse
                                                            • 142.44.242.100
                                                            csrss.exeGet hashmaliciousBrowse
                                                            • 144.217.14.109
                                                            notepad.exeGet hashmaliciousBrowse
                                                            • 192.99.69.170
                                                            RcyatUBgOo.exeGet hashmaliciousBrowse
                                                            • 144.217.14.109
                                                            1fJCh9Qn75.exeGet hashmaliciousBrowse
                                                            • 144.217.14.109
                                                            xS9h6XCLaY.exeGet hashmaliciousBrowse
                                                            • 142.44.243.6
                                                            4FNTlzlu10.exeGet hashmaliciousBrowse
                                                            • 142.44.242.100
                                                            73invoice #2307.exeGet hashmaliciousBrowse
                                                            • 142.44.242.100
                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            OVHFRvilxost.dllGet hashmaliciousBrowse
                                                            • 144.217.14.109
                                                            09MxRUhM69.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            09MxRUhM69.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            HLfjfODkj5.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            59IquDm7QkLPUOQMMOWvQ2rdyXyN.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            G6ywKMSEt9n57YC.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            euqAKLWW.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            59IquDm7QkLPUOQMMOWvQ2rdyXyN.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            fattura giugno 2022.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            RechnungScan.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            URb7XT1C5P.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            Rech 2022.13.06_1004.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            LycDTIyDivae5njGNO98SL.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            Rechnung 2022.13.06_1023.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            51849189224252789195825550.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            LycDTIyDivae5njGNO98SL.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            2O1iJX1OBVGet hashmaliciousBrowse
                                                            • 51.195.151.63
                                                            CjQY9DQ03g.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            CjQY9DQ03g.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            ClimaxoilfieldXgescanntes-DokumentX2022.13.06_1044.xlsGet hashmaliciousBrowse
                                                            • 51.161.73.194
                                                            OVHFRvilxost.dllGet hashmaliciousBrowse
                                                            • 144.217.14.109
                                                            09MxRUhM69.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            09MxRUhM69.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            HLfjfODkj5.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            59IquDm7QkLPUOQMMOWvQ2rdyXyN.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            G6ywKMSEt9n57YC.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            euqAKLWW.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            59IquDm7QkLPUOQMMOWvQ2rdyXyN.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            fattura giugno 2022.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            RechnungScan.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            URb7XT1C5P.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            Rech 2022.13.06_1004.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            LycDTIyDivae5njGNO98SL.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            Rechnung 2022.13.06_1023.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            51849189224252789195825550.xlsGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            LycDTIyDivae5njGNO98SL.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            2O1iJX1OBVGet hashmaliciousBrowse
                                                            • 51.195.151.63
                                                            CjQY9DQ03g.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            CjQY9DQ03g.dllGet hashmaliciousBrowse
                                                            • 94.23.45.86
                                                            ClimaxoilfieldXgescanntes-DokumentX2022.13.06_1044.xlsGet hashmaliciousBrowse
                                                            • 51.161.73.194
                                                            No context
                                                            No context
                                                            Process:C:\Windows\System32\WerFault.exe
                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.8667546502574347
                                                            Encrypted:false
                                                            SSDEEP:192:IWOHsibJK4HXnjakjeA/u7sQS274ltBD:FOMiFKgXnjNjx/u7sQX4ltBD
                                                            MD5:85409E64BDB496C26474B7A3B8B152E0
                                                            SHA1:F5EA51685A764647814E4BBD5D289FF74B80FECA
                                                            SHA-256:BDDFE84CF61DCAC3C07DAEB7FB957E04AC0097595D2FC70CF4556BF6AE3C26E0
                                                            SHA-512:B6E06FC24B3D5A6BCBF542E6292971BFE114525F17FAC8CCED8945A9AAD448933CD690FACFF476AA6ECBA4E8F9DA0DB69A0CCEEDB26F7FA9A7487FF0C978C3C5
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.9.6.3.8.9.4.0.8.4.1.5.2.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.9.6.3.8.9.4.3.1.3.8.3.9.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.b.e.c.e.b.9.e.-.3.0.6.a.-.4.4.3.9.-.8.1.3.8.-.0.6.e.a.b.d.8.1.e.2.4.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.a.5.e.c.b.3.-.d.4.9.7.-.4.3.e.3.-.9.4.d.c.-.d.9.d.b.f.1.5.b.3.a.e.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.v.i.l.x.o.s.t...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.7.4.-.0.0.0.1.-.0.0.1.7.-.2.a.1.9.-.8.7.e.f.8.2.7.f.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                            Process:C:\Windows\System32\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Tue Jun 14 00:09:01 2022, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):60658
                                                            Entropy (8bit):1.7414126334763678
                                                            Encrypted:false
                                                            SSDEEP:96:5T8Zdr8M7A9jXAPBRECi2Toi7C5Hi0us98ECDyiywqPo+7UdfEDYQNeYQ0s4HWIZ:6ZdfqU82EOC53dXAKUdfEEQS5XOaQXd
                                                            MD5:D0B322AE170446324ED84D28449E75B0
                                                            SHA1:5896FC10B3970851AF70DC40B7B6DDA029F445AC
                                                            SHA-256:D43EEDB86946092ABE9CAD6E18C64E462C8AFBD9D00CA2B5F361EBC68E241A4A
                                                            SHA-512:80C3334E06CCB9D9115E471BE83593FE49B0435D50930E3C25A366886A626B76256BF6F516E58D20D184E9ABB800E1FD28B6211F41110FE350DF5B7A93386826
                                                            Malicious:false
                                                            Preview:MDMP....... .........b.........................................1..........T.......8...........T............................................................................................................U...........B......,.......Lw................C._...T.......t.....b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\System32\WerFault.exe
                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8502
                                                            Entropy (8bit):3.688419711468042
                                                            Encrypted:false
                                                            SSDEEP:192:Rrl7r3GLNiI0jV6YhHMc4gmfd2OS67Cprc89bb+afJOipm:RrlsNi9V6YhSgmfd2OSZb7fJO1
                                                            MD5:4131B14869890914A3BDC5E87EC9C9E3
                                                            SHA1:CEE081D6394E81EECFCB6DF7CDBEBBD5C60CD9E7
                                                            SHA-256:B0AC4A6A80B492890267F1BE726F998A706AED8D2AAFFAEE9E8F7212EFEFF850
                                                            SHA-512:25E24C335E156672D69FC1F5C5EF2B923DE54D2FC45EAE8EE90227B796204B23297C2D23A3B259572725E4359FB14D22C3CC09E86259611AE591C488271E3A52
                                                            Malicious:false
                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.2.1.2.<./.P.i.d.>.......
                                                            Process:C:\Windows\System32\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4720
                                                            Entropy (8bit):4.461919643663982
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwSD8zsVJgtBI9PkKWgc8sqYjO8fm8M4JCoCbcF5Iyq85mazZZESC5S6d:uITfv5krgrsqYHJoQVv6d
                                                            MD5:CDE5FFF7F641F72F3F5CECAF6106246D
                                                            SHA1:975A488D53A8507BBAB3260CB030E58300D36587
                                                            SHA-256:68EE16D1D85D6CE7E8626EDC6C892FBB8B84EA6986D0E818B829A70A4A1F0E3E
                                                            SHA-512:311BF6358E71A5E29F8A3F34D3534D125E03B3295A5CE397B4D93423690A26B464ACF3A8CEEFBC117ECDA67710A3DC6B19F43346257ED88921238A11CA8F739A
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1558639" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                            Process:C:\Windows\System32\regsvr32.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):5
                                                            Entropy (8bit):2.321928094887362
                                                            Encrypted:false
                                                            SSDEEP:3:J:J
                                                            MD5:6B201639326E69AD3B93E5D68FD0F2EE
                                                            SHA1:13C9C2DFE24FE69B515BD386C48BD3527A36366B
                                                            SHA-256:DDA3EB541B3D9073945D896195819C593E6AE95D631DFF749F9F8333ADB1E5A4
                                                            SHA-512:74B604808B0C329E2D4BC6AC1322B93771843F196DBC8FB781CB985636F6C5985CB1B5E5021E4E12646141BDD5F45D315748A73645DF8D703152B5B8C4488D6B
                                                            Malicious:false
                                                            Preview:no...
                                                            File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Entropy (8bit):6.576597025104982
                                                            TrID:
                                                            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                            • Win64 Executable (generic) (12005/4) 10.17%
                                                            • Generic Win/DOS Executable (2004/3) 1.70%
                                                            • DOS Executable Generic (2002/1) 1.70%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                            File name:vilxost.dll
                                                            File size:3863040
                                                            MD5:0d3ef01e253037c5e3640842ce60aa4c
                                                            SHA1:ac4486b15486973d8bfe0b457c04ba252abe1b7c
                                                            SHA256:68cf2a424501cace33c3d6c5419057e49f4345c6661e91a6a559888595b387a9
                                                            SHA512:0a0e07e6de8b5007579ba9576c8a4020ae49438d626b380d0703e23d4826859a5879404d32f5be8ce2590f83d508de6fa4c1e3ee35794cfe6c3c53601fa1ebf6
                                                            SSDEEP:98304:JjUgFTt3v8aHTepEDQmPtgfCxMc6qJwstans/:Jow5/r/FqCxMLqJwEms/
                                                            TLSH:B5069D56B7A400A5D9BBC13C8A8B8607E7F2B8175370DBDF16B512690F237E1523EB24
                                                            File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......R..r.f@!.f@!.f@!...!.f@!...!.f@!...!.f@!...!.f@!-8C .f@!-8E xf@!-8D >f@!...!.f@!.fA!qg@!.8D Rd@!.8I .f@!.8C .f@!.8@ .f@!.8.!.f@
                                                            Icon Hash:00928e8e868eb000
                                                            Entrypoint:0x180221f14
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x180000000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x5EE23356 [Thu Jun 11 13:36:22 2020 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:2
                                                            File Version Major:5
                                                            File Version Minor:2
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:2
                                                            Import Hash:aed97d3d2b87ab0b55dab3a3eebe4557
                                                            Instruction
                                                            dec eax
                                                            mov dword ptr [esp+08h], ebx
                                                            dec eax
                                                            mov dword ptr [esp+10h], esi
                                                            push edi
                                                            dec eax
                                                            sub esp, 20h
                                                            dec ecx
                                                            mov edi, eax
                                                            mov ebx, edx
                                                            dec eax
                                                            mov esi, ecx
                                                            cmp edx, 01h
                                                            jne 00007F3A40A8BAE7h
                                                            call 00007F3A40A8C044h
                                                            dec esp
                                                            mov eax, edi
                                                            mov edx, ebx
                                                            dec eax
                                                            mov ecx, esi
                                                            dec eax
                                                            mov ebx, dword ptr [esp+30h]
                                                            dec eax
                                                            mov esi, dword ptr [esp+38h]
                                                            dec eax
                                                            add esp, 20h
                                                            pop edi
                                                            jmp 00007F3A40A8B95Ch
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            nop word ptr [eax+eax+00000000h]
                                                            dec eax
                                                            sub esp, 10h
                                                            dec esp
                                                            mov dword ptr [esp], edx
                                                            dec esp
                                                            mov dword ptr [esp+08h], ebx
                                                            dec ebp
                                                            xor ebx, ebx
                                                            dec esp
                                                            lea edx, dword ptr [esp+18h]
                                                            dec esp
                                                            sub edx, eax
                                                            dec ebp
                                                            cmovb edx, ebx
                                                            dec esp
                                                            mov ebx, dword ptr [00000010h]
                                                            dec ebp
                                                            cmp edx, ebx
                                                            jnc 00007F3A40A8BAFAh
                                                            inc cx
                                                            and edx, 8D4DF000h
                                                            wait
                                                            add al, dh
                                                            Programming Language:
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [ASM] VS2015 UPD3 build 24213
                                                            • [RES] VS2015 UPD3 build 24213
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x3465700x78.rdata
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3465e80xc8.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x63d0000x16d8.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x61c0000x1dad8.pdata
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x63f0000x7de0.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x3176e00x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x3177980x28.rdata
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3177000x94.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x2720000x9d8.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x2708860x270a00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x2720000xd67600xd6800False0.41032242497086246data5.626520856945772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x3490000x2d2c980x3f600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .pdata0x61c0000x1dad80x1dc00False0.4848263524159664data6.241941540699692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            _RANDOMX0x63a0000x5960x600False0.5709635416666666data5.718499409545062IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .gfids0x63b0000xbe40xc00False0.4114583333333333data3.953991198380706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .tls0x63c0000x90x200False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x63d0000x16d80x1800False0.16650390625data3.6957757533174656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x63f0000x7de00x7e00False0.2600756448412698data5.451964975026959IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountry
                                                            RT_ICON0x63d1300x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                                            RT_GROUP_ICON0x63e1d80x14dataEnglishUnited States
                                                            RT_VERSION0x63e1f00x368dataEnglishUnited States
                                                            RT_MANIFEST0x63e5580x17dXML 1.0 document textEnglishUnited States
                                                            DLLImport
                                                            WS2_32.dllshutdown, ntohs, select, WSARecvFrom, WSAIoctl, WSASend, gethostname, WSASocketW, getpeername, WSARecv, FreeAddrInfoW, GetAddrInfoW, htonl, htons, socket, setsockopt, listen, closesocket, bind, WSACleanup, WSAStartup, getsockopt, getsockname, ioctlsocket, WSAGetLastError, WSASetLastError, send, recv
                                                            PSAPI.DLLGetProcessMemoryInfo
                                                            IPHLPAPI.DLLGetAdaptersAddresses
                                                            CRYPT32.dllCertCloseStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertDuplicateCertificateContext, CertFreeCertificateContext, CertGetCertificateContextProperty, CertOpenStore
                                                            KERNEL32.dllLoadResource, FindResourceW, ExpandEnvironmentStringsA, SetLastError, CreateMutexA, WaitForSingleObject, GetCurrentThreadId, Sleep, GetLastError, SetEvent, CloseHandle, FreeConsole, CreateEventA, MultiByteToWideChar, SetThreadPriority, GetCurrentThread, GetProcAddress, GetModuleHandleW, GetConsoleWindow, VirtualProtect, VirtualFree, GetCurrentProcess, VirtualAlloc, GetLargePageMinimum, LocalAlloc, LocalFree, DeviceIoControl, GetModuleFileNameW, CreateFileW, GetSystemTime, SystemTimeToFileTime, GetModuleHandleExW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SwitchToFiber, DeleteFiber, CreateFiber, FindClose, FindFirstFileW, FindNextFileW, WideCharToMultiByte, GetFileType, WriteFile, ConvertFiberToThread, ConvertThreadToFiber, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeLibrary, LoadLibraryA, LoadLibraryW, GetEnvironmentVariableW, ReadConsoleA, ReadConsoleW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, RegisterWaitForSingleObject, UnregisterWait, GetConsoleCursorInfo, DuplicateHandle, PostQueuedCompletionStatus, QueueUserWorkItem, SetConsoleCursorInfo, FillConsoleOutputCharacterW, ReadConsoleInputW, CreateFileA, WriteConsoleInputW, FillConsoleOutputAttribute, WriteConsoleW, GetNumberOfConsoleInputEvents, SetConsoleCursorPosition, CreateDirectoryW, ReadFile, GetFileInformationByHandleEx, GetFileSizeEx, GetDiskFreeSpaceW, RemoveDirectoryW, GetFinalPathNameByHandleW, SetFileTime, ReOpenFile, LockResource, GetFileAttributesW, UnmapViewOfFile, SizeofResource, FlushViewOfFile, GetSystemInfo, SetFilePointerEx, CreateFileMappingA, MoveFileExW, CopyFileW, CreateSymbolicLinkW, MapViewOfFile, FlushFileBuffers, GetLongPathNameW, GetShortPathNameW, GetCurrentDirectoryW, ReadDirectoryChangesW, CreateIoCompletionPort, VerifyVersionInfoA, InitializeCriticalSection, GetVersionExW, FreeEnvironmentStringsW, FileTimeToSystemTime, QueryPerformanceFrequency, VerSetConditionMask, GlobalMemoryStatusEx, GetEnvironmentStringsW, SetConsoleCtrlHandler, CancelIo, SetHandleInformation, SetFileCompletionNotificationModes, FormatMessageA, LoadLibraryExW, SetErrorMode, GetQueuedCompletionStatus, GetQueuedCompletionStatusEx, SetNamedPipeHandleState, CreateNamedPipeW, PeekNamedPipe, CancelSynchronousIo, GetNamedPipeHandleStateA, CancelIoEx, SwitchToThread, ConnectNamedPipe, TerminateProcess, UnregisterWaitEx, LCMapStringW, GetExitCodeProcess, SleepConditionVariableCS, TryEnterCriticalSection, ReleaseSemaphore, WakeConditionVariable, InitializeConditionVariable, ResumeThread, GetNativeSystemInfo, CreateSemaphoreA, GetModuleHandleA, DebugBreak, GetStartupInfoW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, InterlockedPushEntrySList, InterlockedPopEntrySList, FreeLibraryAndExitThread, GetThreadTimes, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, CreateThread, SignalObjectAndWait, CreateTimerQueue, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, InterlockedFlushSList, QueryDepthSList, GetConsoleMode, SetConsoleMode, GetStdHandle, GetFileInformationByHandle, RtlPcToFileHeader, RaiseException, RtlUnwindEx, GetCommandLineA, GetCommandLineW, ExitThread, GetDriveTypeW, SystemTimeToTzSpecificLocalTime, ExitProcess, SetStdHandle, GetConsoleCP, GetFileAttributesExW, SetFileAttributesW, HeapAlloc, HeapFree, HeapReAlloc, GetModuleFileNameA, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetACP, HeapSize, GetFullPathNameW, SetEndOfFile, GetProcessHeap, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, SetEnvironmentVariableA, CreateHardLinkW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, WaitForSingleObjectEx, GetExitCodeThread, CreateEventW, GetTickCount, EncodePointer, DecodePointer, GetCPInfo, CompareStringW, GetLocaleInfoW, GetStringTypeW, ResetEvent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind
                                                            USER32.dllGetSystemMetrics, GetMessageA, MapVirtualKeyW, DispatchMessageA, TranslateMessage, MessageBoxW, GetProcessWindowStation, ShowWindow, SetThreadDesktop, GetThreadDesktop, CloseDesktop, OpenInputDesktop, GetUserObjectInformationW
                                                            SHELL32.dllSHGetSpecialFolderPathA
                                                            ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptEnumProvidersW, CryptSignHashW, CryptDestroyHash, CryptCreateHash, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, CryptReleaseContext, CryptAcquireContextW, ReportEventW, RegisterEventSourceW, DeregisterEventSource, CreateServiceW, CloseServiceHandle, OpenSCManagerW, DeleteService, ControlService, StartServiceW, OpenServiceW, LookupPrivilegeValueW, AdjustTokenPrivileges, OpenProcessToken, LsaOpenPolicy, LsaAddAccountRights, LsaClose, GetTokenInformation, RegCloseKey, RegOpenKeyA, RegQueryValueExA, SetServiceStatus, RegisterServiceCtrlHandlerA
                                                            bcrypt.dllBCryptGenRandom
                                                            NameOrdinalAddress
                                                            DllRegisterServer10x180054608
                                                            ServiceMain20x1800544d0
                                                            fackaaxv30x180053f10
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jun 13, 2022 17:08:52.689646959 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:52.800657034 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:52.800873041 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:52.802459002 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:52.914628029 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:52.914644003 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:52.915007114 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:52.919600964 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:53.030806065 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:53.036674976 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:53.184602022 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:53.226155043 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:53.312546015 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:54.364368916 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:08:54.475563049 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:58.730082035 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:08:58.813252926 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:00.512614965 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:00.623691082 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:21.073837042 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:21.224553108 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.173717976 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:27.281143904 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.281259060 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:27.281713009 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:27.390117884 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.390156031 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.390222073 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:27.395499945 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:27.503127098 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.503515959 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:27.647176027 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.691615105 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:27.815440893 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:29.108287096 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:29.215653896 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:49.747776985 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:49.891176939 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:56.064372063 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:56.174463987 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:56.175014019 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:56.175510883 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:56.286108971 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:56.286151886 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:56.286217928 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:56.289737940 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:56.399998903 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:56.400465965 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:56.548686981 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:56.593924046 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:56.714953899 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:57.952760935 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:58.062589884 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:58.829929113 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:09:58.918334961 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:09:59.280602932 CEST1443349773142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:59.280689001 CEST4977314433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:09:59.329509020 CEST1443349762142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:09:59.329608917 CEST4976214433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:10:00.117994070 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:10:00.228017092 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:10:20.996722937 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:10:21.144711018 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:10:27.091362953 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:27.198432922 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:27.198575020 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:27.199105978 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:27.307035923 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:27.307061911 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:27.307132959 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:27.311110973 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:27.418346882 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:27.418761969 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:27.564101934 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:27.604842901 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:27.717550993 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:29.076545954 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:29.183404922 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:49.266669989 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:49.412242889 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.387281895 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:54.500503063 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.500694036 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:54.501601934 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:54.615670919 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.615698099 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.615816116 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:54.621602058 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:54.735462904 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.737119913 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:54.889868021 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.934207916 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:10:54.985547066 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:56.360218048 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:10:56.473341942 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:11:00.348520041 CEST1443349854144.217.14.109192.168.2.5
                                                            Jun 13, 2022 17:11:00.349025965 CEST4985414433192.168.2.5144.217.14.109
                                                            Jun 13, 2022 17:11:00.647562027 CEST1443349865192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:11:00.652288914 CEST4986514433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:11:00.784455061 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:11:00.970453978 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:11:02.414531946 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:11:02.528094053 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:11:22.621871948 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:11:22.773968935 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:11:27.304673910 CEST1443349871192.99.69.170192.168.2.5
                                                            Jun 13, 2022 17:11:27.304770947 CEST4987114433192.168.2.5192.99.69.170
                                                            Jun 13, 2022 17:11:27.783196926 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:27.899723053 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:27.900214911 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:27.901015043 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:28.018531084 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:28.018557072 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:28.018663883 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:28.022439003 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:28.139111996 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:28.139590025 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:28.292650938 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:28.337615967 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:28.378995895 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:29.708096981 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:29.824672937 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:44.648252964 CEST1443349875142.44.242.100192.168.2.5
                                                            Jun 13, 2022 17:11:44.724150896 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:46.085161924 CEST4987514433192.168.2.5142.44.242.100
                                                            Jun 13, 2022 17:11:46.201687098 CEST1443349875142.44.242.100192.168.2.5
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jun 13, 2022 17:08:52.655299902 CEST5727853192.168.2.58.8.8.8
                                                            Jun 13, 2022 17:08:52.678663015 CEST53572788.8.8.8192.168.2.5
                                                            Jun 13, 2022 17:09:27.150152922 CEST6371253192.168.2.58.8.8.8
                                                            Jun 13, 2022 17:09:27.170659065 CEST53637128.8.8.8192.168.2.5
                                                            Jun 13, 2022 17:09:55.997936964 CEST5712753192.168.2.58.8.8.8
                                                            Jun 13, 2022 17:09:56.023119926 CEST53571278.8.8.8192.168.2.5
                                                            Jun 13, 2022 17:10:27.069637060 CEST5253053192.168.2.58.8.8.8
                                                            Jun 13, 2022 17:10:27.089835882 CEST53525308.8.8.8192.168.2.5
                                                            Jun 13, 2022 17:10:54.353180885 CEST5375953192.168.2.58.8.8.8
                                                            Jun 13, 2022 17:10:54.383729935 CEST53537598.8.8.8192.168.2.5
                                                            Jun 13, 2022 17:11:27.762450933 CEST5891653192.168.2.58.8.8.8
                                                            Jun 13, 2022 17:11:27.781773090 CEST53589168.8.8.8192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Jun 13, 2022 17:08:52.655299902 CEST192.168.2.58.8.8.80xa24fStandard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:27.150152922 CEST192.168.2.58.8.8.80x1a91Standard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:55.997936964 CEST192.168.2.58.8.8.80x697aStandard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:27.069637060 CEST192.168.2.58.8.8.80x1ca8Standard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:54.353180885 CEST192.168.2.58.8.8.80x9dbfStandard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:11:27.762450933 CEST192.168.2.58.8.8.80xa7d2Standard query (0)xmr-us-east1.nanopool.orgA (IP address)IN (0x0001)
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Jun 13, 2022 17:08:52.678663015 CEST8.8.8.8192.168.2.50xa24fNo error (0)xmr-us-east1.nanopool.org144.217.14.139A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:08:52.678663015 CEST8.8.8.8192.168.2.50xa24fNo error (0)xmr-us-east1.nanopool.org142.44.243.6A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:08:52.678663015 CEST8.8.8.8192.168.2.50xa24fNo error (0)xmr-us-east1.nanopool.org144.217.14.109A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:08:52.678663015 CEST8.8.8.8192.168.2.50xa24fNo error (0)xmr-us-east1.nanopool.org192.99.69.170A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:08:52.678663015 CEST8.8.8.8192.168.2.50xa24fNo error (0)xmr-us-east1.nanopool.org142.44.242.100A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:27.170659065 CEST8.8.8.8192.168.2.50x1a91No error (0)xmr-us-east1.nanopool.org144.217.14.109A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:27.170659065 CEST8.8.8.8192.168.2.50x1a91No error (0)xmr-us-east1.nanopool.org192.99.69.170A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:27.170659065 CEST8.8.8.8192.168.2.50x1a91No error (0)xmr-us-east1.nanopool.org144.217.14.139A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:27.170659065 CEST8.8.8.8192.168.2.50x1a91No error (0)xmr-us-east1.nanopool.org142.44.243.6A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:27.170659065 CEST8.8.8.8192.168.2.50x1a91No error (0)xmr-us-east1.nanopool.org142.44.242.100A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:56.023119926 CEST8.8.8.8192.168.2.50x697aNo error (0)xmr-us-east1.nanopool.org142.44.242.100A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:56.023119926 CEST8.8.8.8192.168.2.50x697aNo error (0)xmr-us-east1.nanopool.org144.217.14.139A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:56.023119926 CEST8.8.8.8192.168.2.50x697aNo error (0)xmr-us-east1.nanopool.org142.44.243.6A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:56.023119926 CEST8.8.8.8192.168.2.50x697aNo error (0)xmr-us-east1.nanopool.org144.217.14.109A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:09:56.023119926 CEST8.8.8.8192.168.2.50x697aNo error (0)xmr-us-east1.nanopool.org192.99.69.170A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:27.089835882 CEST8.8.8.8192.168.2.50x1ca8No error (0)xmr-us-east1.nanopool.org144.217.14.109A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:27.089835882 CEST8.8.8.8192.168.2.50x1ca8No error (0)xmr-us-east1.nanopool.org144.217.14.139A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:27.089835882 CEST8.8.8.8192.168.2.50x1ca8No error (0)xmr-us-east1.nanopool.org192.99.69.170A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:27.089835882 CEST8.8.8.8192.168.2.50x1ca8No error (0)xmr-us-east1.nanopool.org142.44.242.100A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:27.089835882 CEST8.8.8.8192.168.2.50x1ca8No error (0)xmr-us-east1.nanopool.org142.44.243.6A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:54.383729935 CEST8.8.8.8192.168.2.50x9dbfNo error (0)xmr-us-east1.nanopool.org144.217.14.139A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:54.383729935 CEST8.8.8.8192.168.2.50x9dbfNo error (0)xmr-us-east1.nanopool.org144.217.14.109A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:54.383729935 CEST8.8.8.8192.168.2.50x9dbfNo error (0)xmr-us-east1.nanopool.org142.44.243.6A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:54.383729935 CEST8.8.8.8192.168.2.50x9dbfNo error (0)xmr-us-east1.nanopool.org142.44.242.100A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:10:54.383729935 CEST8.8.8.8192.168.2.50x9dbfNo error (0)xmr-us-east1.nanopool.org192.99.69.170A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:11:27.781773090 CEST8.8.8.8192.168.2.50xa7d2No error (0)xmr-us-east1.nanopool.org144.217.14.109A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:11:27.781773090 CEST8.8.8.8192.168.2.50xa7d2No error (0)xmr-us-east1.nanopool.org144.217.14.139A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:11:27.781773090 CEST8.8.8.8192.168.2.50xa7d2No error (0)xmr-us-east1.nanopool.org192.99.69.170A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:11:27.781773090 CEST8.8.8.8192.168.2.50xa7d2No error (0)xmr-us-east1.nanopool.org142.44.242.100A (IP address)IN (0x0001)
                                                            Jun 13, 2022 17:11:27.781773090 CEST8.8.8.8192.168.2.50xa7d2No error (0)xmr-us-east1.nanopool.org142.44.243.6A (IP address)IN (0x0001)

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:17:08:49
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\loaddll64.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:loaddll64.exe "C:\Users\user\Desktop\vilxost.dll"
                                                            Imagebase:0x7ff6d8e10000
                                                            File size:140288 bytes
                                                            MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:1
                                                            Start time:17:08:50
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1
                                                            Imagebase:0x7ff602050000
                                                            File size:273920 bytes
                                                            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:2
                                                            Start time:17:08:50
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\regsvr32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:regsvr32.exe /s C:\Users\user\Desktop\vilxost.dll
                                                            Imagebase:0x7ff7d51c0000
                                                            File size:24064 bytes
                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000002.00000002.825421862.000000000138B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            Target ID:3
                                                            Start time:17:08:50
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32.exe "C:\Users\user\Desktop\vilxost.dll",#1
                                                            Imagebase:0x7ff763940000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:4
                                                            Start time:17:08:51
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32.exe C:\Users\user\Desktop\vilxost.dll,DllRegisterServer
                                                            Imagebase:0x7ff763940000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:6
                                                            Start time:17:08:55
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32.exe C:\Users\user\Desktop\vilxost.dll,ServiceMain
                                                            Imagebase:0x7ff763940000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: CoinMiner_Strings, Description: Detects mining pool protocol string in Executable, Source: 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000006.00000002.522837426.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: CoinMiner_Strings, Description: Detects mining pool protocol string in Executable, Source: 00000006.00000000.447809749.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000006.00000000.447809749.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: CoinMiner_Strings, Description: Detects mining pool protocol string in Executable, Source: 00000006.00000000.444316937.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000006.00000000.444316937.00007FFA51362000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            Target ID:8
                                                            Start time:17:08:58
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32.exe C:\Users\user\Desktop\vilxost.dll,fackaaxv
                                                            Imagebase:0x7ff763940000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:9
                                                            Start time:17:09:00
                                                            Start date:13/06/2022
                                                            Path:C:\Windows\System32\WerFault.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\WerFault.exe -u -p 4212 -s 500
                                                            Imagebase:0x7ff76a840000
                                                            File size:494488 bytes
                                                            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            No disassembly