Windows Analysis Report
QEydjQdRxs.dll

Overview

General Information

Sample name: QEydjQdRxs.dll
renamed because original name is a hash value
Original sample name: b62c9168fcde444dbc3be1593e80747929dcf1a49cc6305b49456d68d0c49e71.dll
Analysis ID: 1500943
MD5: 71481f31ac558750937ef27dad2d0025
SHA1: fa2010a283a723a0d2a68d6bc8b16389b36a3a04
SHA256: b62c9168fcde444dbc3be1593e80747929dcf1a49cc6305b49456d68d0c49e71
Tags: dllrammenale-com
Infos:

Detection

Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Sigma detected: Execute DLL with spoofed extension
Sigma detected: rundll32 run dll from internet
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potentially Suspicious Rundll32 Activity
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: https://rammenale.com/for2/regit.tmp$u Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclogY Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtM Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpent Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtPR Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpft Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp4kJ Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp( Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpPR5 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtT Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp) Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtR Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt42 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt6634-1003( Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp% Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpry Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtO Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtZ Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4? Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txte Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpsC: Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt) Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtenth Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4Y Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4FA Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt3 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt0O Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt0 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt: Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpn Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtF Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpw Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpxe.muiE Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpz Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmps Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpC: Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpu Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt6634-1003 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt? Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp8a5 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4u Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp6634-1003 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtry Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtQw Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtrw Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpg Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmph Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4n Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt60 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtentindowsINetCookies Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4r Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp08 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpP Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtfw Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtC: Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt& Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt% Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4~ Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtft Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpA Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtk Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp; Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txti Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclogtxt Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtv Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txts Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp4s5 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp0 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpmp Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp4X Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtentdll8 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtx Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp7 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpc4u Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp4Zfrh Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txt4$ Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtdT Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp4 Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmpuk Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/aclog.txtentdll Avira URL Cloud: Label: malware
Source: https://rammenale.com/for2/regit.tmp6 Avira URL Cloud: Label: malware
Source: QEydjQdRxs.dll Virustotal: Detection: 8% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 95.9% probability
Source: QEydjQdRxs.dll Joe Sandbox ML: detected
Source: QEydjQdRxs.dll Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49712 version: TLS 1.2
Source: QEydjQdRxs.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B921B85 FindFirstFileW,_strlen,ExpandEnvironmentStringsW,CopyFileW,TerminateProcess,CloseHandle,CloseHandle,TerminateProcess,CloseHandle,CloseHandle,FindNextFileW, 0_2_6B921B85
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B9338F4 FindFirstFileExW, 0_2_6B9338F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9E1B85 FindFirstFileW,_strlen,ExpandEnvironmentStringsW,CopyFileW,TerminateProcess,CloseHandle,CloseHandle,TerminateProcess,CloseHandle,CloseHandle,FindNextFileW, 3_2_6F9E1B85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9F38F4 FindFirstFileExW, 3_2_6F9F38F4

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 131.153.206.231 443
Source: Joe Sandbox View ASN Name: SS-ASHUS SS-ASHUS
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET /for2/aclog.txt HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/regit.tmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/regit.tmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/aclog.txt HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/regit.tmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/aclog.txt HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /for2/aclog.txt HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/regit.tmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/regit.tmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/aclog.txt HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/regit.tmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /for2/aclog.txt HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: rammenale.comConnection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: rammenale.com
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Thu, 29 Aug 2024 04:53:02 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Thu, 29 Aug 2024 04:53:02 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Thu, 29 Aug 2024 04:53:02 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Thu, 29 Aug 2024 04:53:02 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Thu, 29 Aug 2024 04:53:04 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Thu, 29 Aug 2024 04:53:04 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F70000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3289414111.0000000007B5C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337362841.0000000008C11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337408753.0000000008C19000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289712371.0000000008C1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CE4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.comm
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F70000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3289414111.0000000007B46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337362841.0000000008C11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289577323.0000000008C11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008CE4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008CA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3286396113.0000000002AAA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com//9
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/6
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/T
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/d
Source: rundll32.exe, 0000000B.00000002.3288849622.0000000005132000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3288849622.000000000511A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog
Source: rundll32.exe, 0000000B.00000002.3286397413.0000000002FB3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008D02000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008C8A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt
Source: rundll32.exe, 00000005.00000002.3286428074.00000000031E8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt%
Source: rundll32.exe, 00000006.00000002.3286763260.0000000003208000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt&
Source: rundll32.exe, 00000006.00000002.3286763260.000000000319A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt)
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008D34000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008CA1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt0
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CA1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt0O
Source: rundll32.exe, 00000006.00000002.3286763260.000000000319A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3286397413.0000000002F4A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt3
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008D02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4$
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt42
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F70000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4?
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F85000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4FA
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4Y
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CFD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4n
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CA1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4r
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F70000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4u
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt4~
Source: rundll32.exe, 00000005.00000002.3286428074.000000000317A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt60
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F42000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3289715229.0000000008CBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt6634-1003
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008C74000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt6634-1003(
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F70000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt:
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008D34000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txt?
Source: rundll32.exe, 00000005.00000002.3286428074.0000000003170000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3286258610.0000000003080000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3286763260.0000000003190000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3286367088.0000000002F90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3286397413.0000000002F40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3286293078.0000000002EA0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtC:
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008C74000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtF
Source: rundll32.exe, 00000005.00000002.3286428074.000000000317A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtM
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008FA7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtO
Source: rundll32.exe, 00000005.00000002.3287957318.00000000032C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtPR
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008D34000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtQw
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CE4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtR
Source: rundll32.exe, 00000006.00000002.3286763260.0000000003289000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtT
Source: rundll32.exe, 0000000B.00000002.3286397413.0000000002FB3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtZ
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtdT
Source: rundll32.exe, 00000006.00000002.3286763260.0000000003208000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txte
Source: rundll32.exe, 0000000B.00000002.3286397413.0000000002F4A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtentdll
Source: rundll32.exe, 00000006.00000002.3286763260.000000000319A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtentdll8
Source: rundll32.exe, 00000005.00000002.3286428074.0000000003170000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtenth
Source: rundll32.exe, 00000006.00000002.3286763260.0000000003208000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtentindowsINetCookies
Source: rundll32.exe, 00000005.00000002.3286428074.00000000031E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3286397413.0000000002FB3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtft
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtfw
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CE4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txti
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008FA7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtk
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtrw
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtry
Source: rundll32.exe, 00000006.00000002.3286558558.00000000030D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3287828894.0000000003280000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txts
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008FA7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtt
Source: rundll32.exe, 00000005.00000002.3286428074.00000000031E8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtv
Source: rundll32.exe, 00000006.00000002.3286763260.0000000003190000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtx
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F70000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3289519547.0000000008F85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3286763260.000000000319A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3289715229.0000000008CFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3289715229.0000000008CE5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008CA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008D02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclog.txtz
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CE4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclogY
Source: rundll32.exe, 00000005.00000002.3286153316.0000000003037000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3286159157.0000000002B77000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3286150447.0000000002B37000.00000004.00000010.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/aclogtxt
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.000000000889F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3286396113.0000000002AA0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp
Source: rundll32.exe, 00000008.00000002.3289370327.0000000008BE3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp$u
Source: rundll32.exe, 0000000C.00000002.3286396113.0000000002AAA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp%
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007BA5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp(
Source: rundll32.exe, 00000008.00000002.3289919472.0000000008C47000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337289222.0000000008C46000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp)
Source: rundll32.exe, 00000007.00000002.3286915382.000000000284A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3286449420.0000000002E3A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp0
Source: rundll32.exe, 0000000C.00000002.3286396113.0000000002AAA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp08
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.000000000889F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp4
Source: rundll32.exe, 0000000C.00000002.3289874951.000000000889F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp4X
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp4Zfrh
Source: rundll32.exe, 00000008.00000003.2337362841.0000000008C11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337408753.0000000008C19000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289712371.0000000008C1B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp4kJ
Source: rundll32.exe, 00000008.00000003.2337362841.0000000008C11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337408753.0000000008C19000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289712371.0000000008C1B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp4s5
Source: rundll32.exe, 00000007.00000002.3286915382.000000000284A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp6
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007B2A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289370327.0000000008BE3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.0000000008814000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp6634-1003
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007BA5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp7
Source: rundll32.exe, 00000007.00000002.3286915382.00000000028CE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp8a5
Source: rundll32.exe, 00000007.00000002.3286915382.000000000284A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmp;
Source: rundll32.exe, 0000000C.00000002.3289874951.000000000882B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpA
Source: rundll32.exe, 00000003.00000002.2054157114.0000000002880000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2053873266.0000000000390000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3286915382.0000000002840000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3286404061.00000000026D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3286340448.0000000002D70000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3286449420.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3286291304.0000000002990000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3286396113.0000000002AA0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpC:
Source: rundll32.exe, 00000008.00000002.3289919472.0000000008C47000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337289222.0000000008C46000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpG
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007BA5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpP
Source: rundll32.exe, 00000007.00000002.3286295606.00000000026C0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpPR5
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008814000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpS
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007B5C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpc4u
Source: rundll32.exe, 00000007.00000002.3286915382.00000000028B9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3286593843.0000000002EAA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337436312.0000000002EAA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3286396113.0000000002B1B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpent
Source: rundll32.exe, 00000007.00000002.3286915382.00000000028CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3286593843.0000000002EAA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337436312.0000000002EAA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpft
Source: rundll32.exe, 0000000C.00000002.3286396113.0000000002B1B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpg
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007B42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmph
Source: rundll32.exe, 00000008.00000002.3289919472.0000000008C47000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337289222.0000000008C46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpmp
Source: rundll32.exe, 00000008.00000002.3289370327.0000000008BFA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpn
Source: rundll32.exe, 0000000C.00000002.3289874951.0000000008814000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpry
Source: rundll32.exe, 00000008.00000002.3288087591.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3288019449.0000000002D40000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmps
Source: loaddll32.exe, 00000000.00000002.2078622698.0000000000B70000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpsC:
Source: rundll32.exe, 00000008.00000002.3286593843.0000000002EAA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337436312.0000000002EAA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpu
Source: rundll32.exe, 0000000C.00000002.3286396113.0000000002B1B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpuk
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007BA5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpw
Source: rundll32.exe, 00000003.00000002.2054268818.0000000002A5A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpxe.muiE
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007B83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3289414111.0000000007B71000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3289414111.0000000007BA5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337362841.0000000008C11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289712371.0000000008C27000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337408753.0000000008C19000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289712371.0000000008C1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337408753.0000000008C27000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3286396113.0000000002B1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.0000000008844000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.000000000889F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/for2/regit.tmpz
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CA1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/k
Source: rundll32.exe, 0000000B.00000002.3289283250.0000000008CE4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://rammenale.com/q
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 131.153.206.231:443 -> 192.168.2.5:49712 version: TLS 1.2
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B92B3BD 0_2_6B92B3BD
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B93612B 0_2_6B93612B
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B92B07B 0_2_6B92B07B
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B93B869 0_2_6B93B869
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B92B71C 0_2_6B92B71C
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B935C80 0_2_6B935C80
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9EB71C 3_2_6F9EB71C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9F5C80 3_2_6F9F5C80
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9EB3BD 3_2_6F9EB3BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9F612B 3_2_6F9F612B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9EB07B 3_2_6F9EB07B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9FB869 3_2_6F9FB869
Source: C:\Windows\System32\loaddll32.exe Code function: String function: 6B925570 appears 45 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 6F9E5570 appears 45 times
Source: QEydjQdRxs.dll Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engine Classification label: mal88.evad.winDLL@20/0@1/1
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:432:120:WilError_03
Source: QEydjQdRxs.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\QEydjQdRxs.dll,mydllmain
Source: QEydjQdRxs.dll Virustotal: Detection: 8%
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\QEydjQdRxs.dll,mydllmain
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\QEydjQdRxs.dll,mydllmain Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/aclog.txt Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/regit.tmp Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FBF23B40-E3F0-101B-8488-00AA003E56F8}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: QEydjQdRxs.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B93BF81 push ecx; ret 0_2_6B93BF94
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9FBF81 push ecx; ret 3_2_6F9FBF94
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_00446003 push ecx; iretd 4_2_00446004
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_00443513 push ecx; iretd 4_2_00443514
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_004461D3 push ecx; iretd 4_2_004461D4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_004431A3 push ecx; iretd 4_2_004431A4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_00446433 push ecx; iretd 4_2_00446434
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_092ED728 push ebx; retf 5_2_092ED7B9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_092ED708 push ebx; retf 5_2_092ED7B9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_092ED795 push ebx; retf 5_2_092ED7B9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_092EFB78 pushad ; iretd 5_2_092EFB79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_07EDF9B4 push eax; iretd 7_2_07EDF9BD
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\loaddll32.exe API coverage: 8.3 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 6.5 %
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5960 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2468 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B921B85 FindFirstFileW,_strlen,ExpandEnvironmentStringsW,CopyFileW,TerminateProcess,CloseHandle,CloseHandle,TerminateProcess,CloseHandle,CloseHandle,FindNextFileW, 0_2_6B921B85
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B9338F4 FindFirstFileExW, 0_2_6B9338F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9E1B85 FindFirstFileW,_strlen,ExpandEnvironmentStringsW,CopyFileW,TerminateProcess,CloseHandle,CloseHandle,TerminateProcess,CloseHandle,CloseHandle,FindNextFileW, 3_2_6F9E1B85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9F38F4 FindFirstFileExW, 3_2_6F9F38F4
Source: C:\Windows\System32\loaddll32.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Thread delayed: delay time: 30000 Jump to behavior
Source: rundll32.exe, 0000000C.00000002.3289874951.000000000882F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW5
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F85000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWgG
Source: rundll32.exe, 00000006.00000002.3289715229.0000000008CD2000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWP
Source: rundll32.exe, 00000008.00000002.3289577323.0000000008C00000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337362841.0000000008C00000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW0
Source: rundll32.exe, 00000005.00000002.3289519547.0000000008F5E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3289519547.0000000008F85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3289715229.0000000008CFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3289414111.0000000007B71000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3289414111.0000000007B46000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3289712371.0000000008C27000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2337408753.0000000008C27000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008CEE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3289283250.0000000008C90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.000000000882F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.3289874951.000000000888E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000007.00000002.3289414111.0000000007B46000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW8h
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B9253EE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_6B9253EE
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B934AF5 GetProcessHeap, 0_2_6B934AF5
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B9253EE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_6B9253EE
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B924EDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_6B924EDC
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B92DCFD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_6B92DCFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9E4EDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_6F9E4EDC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9EDCFD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_6F9EDCFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6F9E53EE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_6F9E53EE

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 131.153.206.231 443
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QEydjQdRxs.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B9255EB cpuid 0_2_6B9255EB
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6B92503D GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_6B92503D
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs