Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PSqBbz.dll

Overview

General Information

Sample name:PSqBbz.dll
Analysis ID:1502270
MD5:322e3eb0984014882ee5ca1398f74805
SHA1:550f9ba5bd052dc7890f48f64ab3313eb171fbad
SHA256:49676c6ae76771a48914b205927818f931d301cdf87104c874b234f349d6ce91
Tags:dll
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5636 cmdline: loaddll32.exe "C:\Users\user\Desktop\PSqBbz.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 516 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5948 cmdline: rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5924 cmdline: rundll32.exe C:\Users\user\Desktop\PSqBbz.dll,#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3608 cmdline: rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PSqBbz.dllAvira: detected
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/Avira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/cAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txtAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTONuHtHNzAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/flateoAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTOAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/Avira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/cBAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdaKllZcBAvira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYahKgGMcAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipauUfjiGVmnuAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt-Avira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/4Avira URL Cloud: Label: malware
Source: http://www.rapidfilestorage.com/T4Avira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPlTXEFRmQkkyAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbBAvira URL Cloud: Label: malware
Source: http://skrptfiles.tracemonitors.com//Avira URL Cloud: Label: malware
Source: env-3936544.jcloud.kzVirustotal: Detection: 5%Perma Link
Source: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txty.IE5Virustotal: Detection: 7%Perma Link
Source: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txtVirustotal: Detection: 9%Perma Link
Source: PSqBbz.dllReversingLabs: Detection: 42%
Source: PSqBbz.dllVirustotal: Detection: 51%Perma Link
Source: PSqBbz.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: PSqBbz.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 108.156.60.94 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.22.66.16 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 194.67.87.38 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.22.66.15 80Jump to behavior
Source: Joe Sandbox ViewIP Address: 108.156.60.94 108.156.60.94
Source: Joe Sandbox ViewIP Address: 185.22.66.16 185.22.66.16
Source: Joe Sandbox ViewIP Address: 194.67.87.38 194.67.87.38
Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
Source: Joe Sandbox ViewASN Name: PSKZ PSKZ
Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
Source: Joe Sandbox ViewASN Name: PSKZ PSKZ
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTONuHtHNz HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.rapidfilestorage.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: helsinki-dtc.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipauUfjiGVmnu HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: skrptfiles.tracemonitors.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYahKgGMc HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.rapidfilestorage.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwu HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: helsinki-dtc.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbBAvKJJxjQxpV HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: skrptfiles.tracemonitors.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdaKllZcB HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.rapidfilestorage.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: helsinki-dtc.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPlTXEFRmQkky HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: skrptfiles.tracemonitors.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTONuHtHNz HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.rapidfilestorage.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: helsinki-dtc.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipauUfjiGVmnu HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: skrptfiles.tracemonitors.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYahKgGMc HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.rapidfilestorage.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwu HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: helsinki-dtc.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbBAvKJJxjQxpV HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: skrptfiles.tracemonitors.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdaKllZcB HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.rapidfilestorage.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: helsinki-dtc.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPlTXEFRmQkky HTTP/1.1Accept: */*Cache-Control: no-cacheAccept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: skrptfiles.tracemonitors.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: www.rapidfilestorage.com
Source: global trafficDNS traffic detected: DNS query: helsinki-dtc.com
Source: global trafficDNS traffic detected: DNS query: skrptfiles.tracemonitors.com
Source: rundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246078521.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/8
Source: rundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/efee8a9d-c845-40f1-ac21-573d1d5ce43f
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt
Source: rundll32.exe, 00000007.00000003.2254638857.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245819487.0000000005123000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM
Source: rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM7
Source: rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMT
Source: rundll32.exe, 00000007.00000003.2246181279.00000000033E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMa
Source: rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMt
Source: rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMz
Source: rundll32.exe, 00000005.00000003.2220256911.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2219895638.00000000051A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.000000000312D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.00000000030D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwu
Source: rundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.0000000003109000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwuL
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002DE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203652616.0000000002E39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb#
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb%
Source: rundll32.exe, 00000004.00000003.2194775462.0000000004E23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb(
Source: rundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb4
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203652616.0000000002E39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb5
Source: rundll32.exe, 00000004.00000003.2195024449.0000000002DE5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002DE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFbN
Source: rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.000000000310F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txty.IE5
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003122000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://helsinki-dtc.com/x
Source: rundll32.exe, 00000004.00000003.2203652616.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/
Source: rundll32.exe, 00000004.00000003.2203652616.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002DE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com//
Source: rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/cB
Source: rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/flateo
Source: rundll32.exe, 00000005.00000003.2228442810.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt
Source: rundll32.exe, 00000004.00000003.2203358013.0000000002E45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt-
Source: rundll32.exe, 00000005.00000002.2229025019.00000000030D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbB
Source: rundll32.exe, 00000004.00000003.2203768862.0000000002E06000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPip
Source: rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoP
Source: rundll32.exe, 00000004.00000002.2204542745.0000000002D9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2228922102.000000000308A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/
Source: rundll32.exe, 00000004.00000002.2204542745.0000000002D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/4
Source: rundll32.exe, 00000004.00000002.2204542745.0000000002D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/T4
Source: rundll32.exe, 00000005.00000002.2228922102.000000000308A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/c
Source: rundll32.exe, 00000004.00000003.2194878701.0000000002DE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTO
Source: rundll32.exe, 00000007.00000003.2238565013.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238653914.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246078521.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254158292.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254748663.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255151257.00000000033F1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238653914.00000000033CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238457258.0000000004CE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKd
Source: rundll32.exe, 00000005.00000003.2220360028.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.00000000030D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAY
Source: rundll32.exe, 00000004.00000003.2186699648.0000000002E21000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2186201668.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2212626014.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2212750807.000000000310E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238653914.00000000033CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: PSqBbz.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal80.evad.winDLL@10/9@4/4
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\version[1].txtJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\1_ACplhEYFqoItrr
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3580:120:WilError_03
Source: PSqBbz.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\PSqBbz.dll,#1
Source: PSqBbz.dllReversingLabs: Detection: 42%
Source: PSqBbz.dllVirustotal: Detection: 51%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\PSqBbz.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\PSqBbz.dll,#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\PSqBbz.dll,#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}\InProcServer32Jump to behavior
Source: PSqBbz.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: PSqBbz.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PSqBbz.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PSqBbz.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PSqBbz.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PSqBbz.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 00000007.00000002.2255090442.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246078521.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.0000000003397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH.:
Source: rundll32.exe, 00000004.00000003.2203507150.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2195024449.0000000002E06000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2186699648.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203652616.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2195024449.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E06000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E06000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002E06000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002DE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000005.00000003.2228330297.00000000030D1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220256911.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2212626014.00000000030D6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.00000000030D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWZ%
Source: rundll32.exe, 00000007.00000002.2255090442.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246078521.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.0000000003397000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW-4

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 108.156.60.94 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.22.66.16 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 194.67.87.38 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.22.66.15 80Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
111
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media12
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PSqBbz.dll42%ReversingLabsWin32.Adware.Generic
PSqBbz.dll51%VirustotalBrowse
PSqBbz.dll100%AviraHEUR/AGEN.1302756
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
env-3936544.jcloud.kz5%VirustotalBrowse
d1u0l9f6kr1di3.cloudfront.net0%VirustotalBrowse
helsinki-dtc.com1%VirustotalBrowse
www.rapidfilestorage.com1%VirustotalBrowse
skrptfiles.tracemonitors.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb50%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb40%Avira URL Cloudsafe
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPip100%Avira URL Cloudmalware
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txty.IE50%Avira URL Cloudsafe
http://www.rapidfilestorage.com/100%Avira URL Cloudmalware
http://helsinki-dtc.com/efee8a9d-c845-40f1-ac21-573d1d5ce43f0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txty.IE58%VirustotalBrowse
http://www.rapidfilestorage.com/1%VirustotalBrowse
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwuL0%Avira URL Cloudsafe
http://www.rapidfilestorage.com/c100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoP100%Avira URL Cloudmalware
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAY100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt100%Avira URL Cloudmalware
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTONuHtHNz100%Avira URL Cloudmalware
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMT0%Avira URL Cloudsafe
http://skrptfiles.tracemonitors.com/flateo100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt1%VirustotalBrowse
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTO100%Avira URL Cloudmalware
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt10%VirustotalBrowse
http://skrptfiles.tracemonitors.com/100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/cB100%Avira URL Cloudmalware
http://helsinki-dtc.com/80%Avira URL Cloudsafe
http://helsinki-dtc.com/x0%Avira URL Cloudsafe
http://www.rapidfilestorage.com/c2%VirustotalBrowse
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKd100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/1%VirustotalBrowse
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFbN0%Avira URL Cloudsafe
http://helsinki-dtc.com/80%VirustotalBrowse
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdaKllZcB100%Avira URL Cloudmalware
http://helsinki-dtc.com/x2%VirustotalBrowse
http://helsinki-dtc.com/0%Avira URL Cloudsafe
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYahKgGMc100%Avira URL Cloudmalware
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwu0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMa0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb%0%Avira URL Cloudsafe
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipauUfjiGVmnu100%Avira URL Cloudmalware
http://helsinki-dtc.com/1%VirustotalBrowse
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb#0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMz0%Avira URL Cloudsafe
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb(0%Avira URL Cloudsafe
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt-100%Avira URL Cloudmalware
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM70%Avira URL Cloudsafe
http://www.rapidfilestorage.com/4100%Avira URL Cloudmalware
http://www.rapidfilestorage.com/42%VirustotalBrowse
http://www.rapidfilestorage.com/T4100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPlTXEFRmQkky100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbB100%Avira URL Cloudmalware
http://skrptfiles.tracemonitors.com//100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
env-3936544.jcloud.kz
185.22.66.16
truetrueunknown
d1u0l9f6kr1di3.cloudfront.net
108.156.60.94
truetrueunknown
helsinki-dtc.com
194.67.87.38
truetrueunknown
skrptfiles.tracemonitors.com
unknown
unknownfalseunknown
www.rapidfilestorage.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTONuHtHNztrue
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMtrue
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFbtrue
  • Avira URL Cloud: safe
unknown
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdaKllZcBtrue
  • Avira URL Cloud: malware
unknown
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYahKgGMctrue
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwutrue
  • Avira URL Cloud: safe
unknown
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipauUfjiGVmnutrue
  • Avira URL Cloud: malware
unknown
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPlTXEFRmQkkytrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb5rundll32.exe, 00000004.00000003.2194878701.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203652616.0000000002E39000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb4rundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPiprundll32.exe, 00000004.00000003.2203768862.0000000002E06000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txtrundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmpfalse
  • 10%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txty.IE5rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.000000000310F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 8%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.rapidfilestorage.com/rundll32.exe, 00000004.00000002.2204542745.0000000002D9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2228922102.000000000308A000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/efee8a9d-c845-40f1-ac21-573d1d5ce43frundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwuLrundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.0000000003109000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.rapidfilestorage.com/crundll32.exe, 00000005.00000002.2228922102.000000000308A000.00000004.00000020.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPrundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYrundll32.exe, 00000005.00000003.2220360028.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.00000000030D1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txtrundll32.exe, 00000005.00000003.2228442810.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMTrundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://skrptfiles.tracemonitors.com/flateorundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTOrundll32.exe, 00000004.00000003.2194878701.0000000002DE3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://skrptfiles.tracemonitors.com/rundll32.exe, 00000004.00000003.2203652616.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.000000000310F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003110000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://skrptfiles.tracemonitors.com/cBrundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/8rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/xrundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003122000.00000004.00000020.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.rapidfilestorage.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdrundll32.exe, 00000007.00000003.2238565013.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238653914.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246078521.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254158292.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254748663.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255151257.00000000033F1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238565013.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238653914.00000000033CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2238457258.0000000004CE3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFbNrundll32.exe, 00000004.00000003.2195024449.0000000002DE5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002DE3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/rundll32.exe, 00000004.00000002.2204766772.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203507150.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E1B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228330297.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228442810.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228610375.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220256911.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2220360028.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229067943.0000000003122000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2229025019.0000000003109000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246078521.0000000003397000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMarundll32.exe, 00000007.00000003.2246181279.00000000033E7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb%rundll32.exe, 00000004.00000003.2194878701.0000000002E1B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb#rundll32.exe, 00000004.00000003.2194878701.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002E39000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203652616.0000000002E39000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMzrundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb(rundll32.exe, 00000004.00000003.2194775462.0000000004E23000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt-rundll32.exe, 00000004.00000003.2203358013.0000000002E45000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM7rundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2246181279.00000000033CE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.rapidfilestorage.com/4rundll32.exe, 00000004.00000002.2204542745.0000000002D9A000.00000004.00000020.00020000.00000000.sdmpfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://www.rapidfilestorage.com/T4rundll32.exe, 00000004.00000002.2204542745.0000000002D9A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://helsinki-dtc.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtMtrundll32.exe, 00000007.00000003.2254436103.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2245931924.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2254638857.00000000033C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2255090442.00000000033C7000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://skrptfiles.tracemonitors.com/updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbBrundll32.exe, 00000005.00000002.2229025019.00000000030D1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    http://skrptfiles.tracemonitors.com//rundll32.exe, 00000004.00000003.2203652616.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2204766772.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203768862.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2203358013.0000000002DE6000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    108.156.60.94
    d1u0l9f6kr1di3.cloudfront.netUnited States
    16509AMAZON-02UStrue
    185.22.66.16
    env-3936544.jcloud.kzKazakhstan
    48716PSKZtrue
    194.67.87.38
    helsinki-dtc.comRussian Federation
    197695AS-REGRUtrue
    185.22.66.15
    unknownKazakhstan
    48716PSKZtrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1502270
    Start date and time:2024-08-31 22:11:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 47s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:PSqBbz.dll
    Detection:MAL
    Classification:mal80.evad.winDLL@10/9@4/4
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target rundll32.exe, PID 5948 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    108.156.60.94BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
    • skrptfiles.tracemonitors.com/updates/yd/yt_wrtzr_1/win/version.txt
    185.22.66.16HeOkukP.dllGet hashmaliciousUnknownBrowse
    • www.rapidfilestorage.com/clrls/cl_rls.json
    HeOkukP.dllGet hashmaliciousUnknownBrowse
    • www.rapidfilestorage.com/clrls/cl_rls.json
    3QKcKCEzYP.exeGet hashmaliciousLummaC, Djvu, Go Injector, LummaC Stealer, Neoreklami, Stealc, SystemBCBrowse
    • www.rapidfilestorage.com/updates/yd/yt_wrtzr_1/win/version.txt?cyQFFYXfMxTbmOSMGoSEriCQDgQhzEzaB
    284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
    • www.rapidfilestorage.com/updates/yd/yt_wrtzr_1/win/version.txt?KubbvdjJfOkOrksIlOLwwrZZFcTPifwjk
    file.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
    • www.rapidfilestorage.com/updates/yd/wrtzr_yt_a_1/win/version.txt?pvxjjZzJfBoShjdxqXwarNhIJWxMQBmcQ
    file.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
    • www.rapidfilestorage.com/clrls/cl_rls.json
    setup.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, RedLine, Stealc, Stealerium, VidarBrowse
    • www.rapidfilestorage.com/updates/yd/yt_wrtzr_1/win/version.txt?jEvIItcUYFPwlFHkOhJhTyAHjyfMbxfRv
    1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
    • www.rapidfilestorage.com/updates/yd/yt_wrtzr_1/win/version.txt
    1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
    • www.rapidfilestorage.com/clrls/cl_rls.json
    194.67.87.383QKcKCEzYP.exeGet hashmaliciousLummaC, Djvu, Go Injector, LummaC Stealer, Neoreklami, Stealc, SystemBCBrowse
    • helsinki-dtc.com/updates/yd/yt_wrtzr_1/win/version.txt
    284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
    • helsinki-dtc.com/updates/yd/yt_wrtzr_1/win/version.txt?TCtDuRUdKYZTtiynHOebqmOBgoFjjnvzy
    file.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
    • helsinki-dtc.com/updates/yd/wrtzr_yt_a_1/win/version.txt?EpoEKfUQMFWhrYOXQufActGZQbgETyVBL
    file.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
    • helsinki-dtc.com/updates/yd/wrtzr_yt_a_1/win/version.txt
    setup.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, RedLine, Stealc, Stealerium, VidarBrowse
    • helsinki-dtc.com/updates/yd/wrtzr_yt_a_1/win/version.txt
    1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
    • helsinki-dtc.com/updates/yd/wrtzr_yt_a_1/win/version.txt
    1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
    • helsinki-dtc.com/updates/yd/wrtzr_yt_a_1/win/version.txt
    1719520929.094843_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PrivateLoader, PureLog Stealer, Socks5Systemz, Stealc, VidarBrowse
    • helsinki-dtc.com/updates/yd/wrtzr_yt_a_1/win/version.txt
    BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
    • helsinki-dtc.com/updates/yd/yt_wrtzr_1/win/version.txt
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    helsinki-dtc.com3QKcKCEzYP.exeGet hashmaliciousLummaC, Djvu, Go Injector, LummaC Stealer, Neoreklami, Stealc, SystemBCBrowse
    • 194.67.87.38
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 194.67.87.38
    284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
    • 194.67.87.38
    file.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
    • 194.67.87.38
    Install.exeGet hashmaliciousNeoreklamiBrowse
    • 194.67.87.38
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 194.67.87.38
    Install.exeGet hashmaliciousNeoreklamiBrowse
    • 194.67.87.38
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 194.67.87.38
    d1u0l9f6kr1di3.cloudfront.netfile.exeGet hashmaliciousNeoreklamiBrowse
    • 108.156.60.70
    3QKcKCEzYP.exeGet hashmaliciousLummaC, Djvu, Go Injector, LummaC Stealer, Neoreklami, Stealc, SystemBCBrowse
    • 18.239.236.83
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 108.156.60.94
    284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
    • 13.32.145.29
    file.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
    • 108.156.60.71
    Install.exeGet hashmaliciousNeoreklamiBrowse
    • 108.156.60.62
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 13.225.78.36
    Install.exeGet hashmaliciousNeoreklamiBrowse
    • 18.239.236.66
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 108.156.60.70
    env-3936544.jcloud.kzHeOkukP.dllGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    HeOkukP.dllGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    file.exeGet hashmaliciousNeoreklamiBrowse
    • 185.22.66.16
    3QKcKCEzYP.exeGet hashmaliciousLummaC, Djvu, Go Injector, LummaC Stealer, Neoreklami, Stealc, SystemBCBrowse
    • 185.22.66.16
    setup.exeGet hashmaliciousNeoreklamiBrowse
    • 185.22.66.15
    284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
    • 185.22.66.16
    file.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
    • 185.22.66.16
    file.exeGet hashmaliciousNeoreklamiBrowse
    • 185.22.66.16
    Install.exeGet hashmaliciousNeoreklamiBrowse
    • 185.22.66.15
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02USTsLvuUO.dllGet hashmaliciousUnknownBrowse
    • 35.160.60.134
    COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
    • 13.248.169.48
    OmnqazpM3P.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
    • 52.212.52.84
    play.exeGet hashmaliciousFormBookBrowse
    • 13.248.169.48
    https://grand-pika-f642c4.netlify.app/#mthatha@africawsp.co.zaGet hashmaliciousUnknownBrowse
    • 99.86.8.175
    SecuriteInfo.com.Linux.Siggen.9999.15938.22369.elfGet hashmaliciousMiraiBrowse
    • 13.226.40.92
    SecuriteInfo.com.Linux.Siggen.9999.19003.7982.elfGet hashmaliciousMiraiBrowse
    • 35.183.153.119
    http://security-azure.b-cdn.net/Get hashmaliciousUnknownBrowse
    • 18.245.60.57
    https://found.ee/5PKNrGet hashmaliciousUnknownBrowse
    • 18.239.50.3
    AS-REGRUOmnqazpM3P.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
    • 194.58.114.223
    VVeOllkgMF.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
    • 195.133.13.230
    gHPYUEh253.exeGet hashmaliciousDjvu, Neoreklami, Stealc, Vidar, XmrigBrowse
    • 194.58.114.223
    Payment_Advice.exeGet hashmaliciousFormBook, GuLoaderBrowse
    • 37.140.192.207
    IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
    • 194.58.112.174
    Quotation-27-08-24.exeGet hashmaliciousFormBookBrowse
    • 194.58.112.174
    INVG0088 LHV3495264 BL327291535V.exeGet hashmaliciousFormBookBrowse
    • 194.58.112.174
    Quote 1T PN40 082624.exeGet hashmaliciousFormBookBrowse
    • 194.58.112.174
    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
    • 37.140.192.213
    PSKZHeOkukP.dllGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    HeOkukP.dllGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    CGVYlOv.wsfGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    press to unblock document.vbsGet hashmaliciousEmotetBrowse
    • 94.247.135.151
    https://vetdiagnoz.kz/templates/beez3/voice.htmlGet hashmaliciousHTMLPhisherBrowse
    • 195.210.47.120
    RechnungsDetails 2023.08.03_1031.zip.zipGet hashmaliciousEmotetBrowse
    • 94.247.135.151
    PO-465514-180820.doc.zipGet hashmaliciousUnknownBrowse
    • 195.210.46.42
    PO-465514-180820.doc.zipGet hashmaliciousUnknownBrowse
    • 195.210.46.42
    http://barsugo.com/ckfinder/userfiles/files/gamapixejoxawifom.pdfGet hashmaliciousGRQ ScamBrowse
    • 195.210.46.56
    PSKZHeOkukP.dllGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    HeOkukP.dllGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    CGVYlOv.wsfGet hashmaliciousUnknownBrowse
    • 185.22.66.16
    press to unblock document.vbsGet hashmaliciousEmotetBrowse
    • 94.247.135.151
    https://vetdiagnoz.kz/templates/beez3/voice.htmlGet hashmaliciousHTMLPhisherBrowse
    • 195.210.47.120
    RechnungsDetails 2023.08.03_1031.zip.zipGet hashmaliciousEmotetBrowse
    • 94.247.135.151
    PO-465514-180820.doc.zipGet hashmaliciousUnknownBrowse
    • 195.210.46.42
    PO-465514-180820.doc.zipGet hashmaliciousUnknownBrowse
    • 195.210.46.42
    http://barsugo.com/ckfinder/userfiles/files/gamapixejoxawifom.pdfGet hashmaliciousGRQ ScamBrowse
    • 195.210.46.56
    No context
    No context
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Reputation:low
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Reputation:low
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Reputation:low
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Preview:2.0.0.3255
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.246439344671016
    Encrypted:false
    SSDEEP:3:xh+:e
    MD5:17C89252835FDAB937F9923CDF66E3BF
    SHA1:F1A6162259C65804124D782B3D396F3AB4103D0A
    SHA-256:7AC1B246E768D362B961292D3CE4D82A510CB19C04C7D36A338EB29D7A367711
    SHA-512:FCA8C7519DA2AF986201C7E12A008CF63BFBADDD7D5CD3C8ACAFB0CA16F0D6BC190F152E59B04D6DF32BEF36BDC4EC56BAFC6BC3B5A7762EDF0F7BEF2516CC8E
    Malicious:false
    Preview:2.0.0.3255
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.6302844206153715
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:PSqBbz.dll
    File size:501'760 bytes
    MD5:322e3eb0984014882ee5ca1398f74805
    SHA1:550f9ba5bd052dc7890f48f64ab3313eb171fbad
    SHA256:49676c6ae76771a48914b205927818f931d301cdf87104c874b234f349d6ce91
    SHA512:8169b4ba7444e97757dd17b65c4417ca990092c9eb37fe95c88ded23e920832055601e8560840b9a437acb002770475f062c89024495da356e8c77e5c8fbe528
    SSDEEP:6144:dv2/Qv1XKasQKn6AvQlYGoMKQcIWG9hZEy4VbYTo6PBz/X3LWMCBN6AQ:dv2g1XKadfALGoMKQuqOePBTX7npAQ
    TLSH:BAB48E15B340E231C4DE40B63529EBAE01EDBE7058B94447B7C46B2E6EF46D1DA36B23
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P.N... ... ... .....4. .....R. ....... ....... ...!... ..h.... ..h.... ....... ..h.... .Rich.. .........................PE..L..
    Icon Hash:7ae282899bbab082
    Entrypoint:0x10045f1b
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x614EFFC5 [Sat Sep 25 10:53:57 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:1375420394a3775dca4e8d129dd830b3
    Instruction
    push ebp
    mov ebp, esp
    cmp dword ptr [ebp+0Ch], 01h
    jne 00007F6C60806FC7h
    call 00007F6C60811388h
    push dword ptr [ebp+10h]
    push dword ptr [ebp+0Ch]
    push dword ptr [ebp+08h]
    call 00007F6C60806FCCh
    add esp, 0Ch
    pop ebp
    retn 000Ch
    push 0000000Ch
    push 10070A38h
    call 00007F6C6080E84Bh
    xor eax, eax
    inc eax
    mov esi, dword ptr [ebp+0Ch]
    test esi, esi
    jne 00007F6C60806FCEh
    cmp dword ptr [10078644h], esi
    je 00007F6C608070AAh
    and dword ptr [ebp-04h], 00000000h
    cmp esi, 01h
    je 00007F6C60806FC7h
    cmp esi, 02h
    jne 00007F6C60806FF7h
    mov ecx, dword ptr [1005F534h]
    test ecx, ecx
    je 00007F6C60806FCEh
    push dword ptr [ebp+10h]
    push esi
    push dword ptr [ebp+08h]
    call ecx
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007F6C60807077h
    push dword ptr [ebp+10h]
    push esi
    push dword ptr [ebp+08h]
    call 00007F6C60806DD6h
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007F6C60807060h
    mov ebx, dword ptr [ebp+10h]
    push ebx
    push esi
    push dword ptr [ebp+08h]
    call 00007F6C6081139Dh
    mov edi, eax
    mov dword ptr [ebp-1Ch], edi
    cmp esi, 01h
    jne 00007F6C60806FEAh
    test edi, edi
    jne 00007F6C60806FE6h
    push ebx
    push eax
    push dword ptr [ebp+08h]
    call 00007F6C60811385h
    push ebx
    push edi
    push dword ptr [ebp+08h]
    call 00007F6C60806D9Ch
    mov eax, dword ptr [1005F534h]
    test eax, eax
    je 00007F6C60806FC9h
    push ebx
    push edi
    push dword ptr [ebp+08h]
    call eax
    Programming Language:
    • [ASM] VS2013 build 21005
    • [C++] VS2013 build 21005
    • [ C ] VS2013 build 21005
    • [EXP] VS2013 UPD5 build 40629
    • [RES] VS2013 build 21005
    • [LNK] VS2013 UPD5 build 40629
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x711100x38.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x711480xa0.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3140000x10.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3150000x3a7c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6aca80x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x5e0000x2d0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x5ce840x5d0002928872b79671735fe282c7fc3fc158cFalse0.5504557291666666data6.56042624951286IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x5e0000x1416c0x142009dfe7ee80c9efe5454d1f6a2623daea9False0.44504561335403725data5.222737505215552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x730000x2a076c0x5400a50d5bfe522e924c31977463bb833ce9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x3140000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x3150000x3a7c0x3c008aa612a97473a120193a7eb6b9ead8ccFalse0.7449869791666667data6.580993116427223IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    KERNEL32.dllTlsAlloc, SuspendThread, ResumeThread, TlsSetValue, IsProcessorFeaturePresent, GetOverlappedResult, FindNextFileW, GetCPInfo, SetErrorMode, SetCommBreak, GetWindowsDirectoryA, GetLocaleInfoW, GetLastError, GetFileType, CreateEventW, GetDriveTypeW, EnumCalendarInfoW, GetUserDefaultLCID, GetTickCount, SizeofResource, GetSystemDefaultUILanguage, WideCharToMultiByte, LoadLibraryW, GetLocalTime, WinExec, GetWindowsDirectoryW, ExpandEnvironmentStringsW, TlsGetValue, GetEnvironmentStringsW, GetCurrentThread, GetSystemDirectoryA, DeleteCriticalSection, EnterCriticalSection, LoadLibraryA, EnumResourceTypesW, DeleteFileW, ReadConsoleW, WriteConsoleW, SetStdHandle, OutputDebugStringW, LoadLibraryExW, HeapReAlloc, SetFilePointerEx, ReadFile, GetConsoleMode, FlushFileBuffers, CloseHandle, GetModuleFileNameW, WriteFile, GetOEMCP, IsValidCodePage, FreeEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetStdHandle, HeapSize, ExitProcess, IsDebuggerPresent, GetModuleFileNameA, QueryDosDeviceW, GetPrivateProfileIntW, SetThreadPriority, GetACP, CreateEventA, SetCommState, GetSystemTimeAsFileTime, GetLogicalDrives, GlobalLock, GetModuleHandleExW, HeapFree, SetFilePointer, SwitchToThread, FindFirstFileW, GetDiskFreeSpaceW, TlsFree, GetStartupInfoW, CreateFileW, MulDiv, GetFileAttributesW, GetExitCodeProcess, GetConsoleCP, ExpandEnvironmentStringsA, WaitForSingleObjectEx, CompareFileTime, SystemTimeToFileTime, GetEnvironmentVariableW, EncodePointer, GetCommandLineW, GetSystemTime, WritePrivateProfileStringW, UnmapViewOfFile, ExitThread, GetFullPathNameW, GetProcessHeap, EnumSystemLocalesW, IsValidLocale, LCMapStringW, GetProcAddress, DecodePointer, LeaveCriticalSection, MultiByteToWideChar, GetStringTypeW, GetCommandLineA, GetCurrentThreadId, RaiseException, RtlUnwind, HeapAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, GetModuleHandleW
    USER32.dllMessageBoxA, GetDlgItemTextW, CreateIconIndirect, CharLowerBuffW, DestroyCursor, MapWindowPoints, EndPaint, SetDlgItemTextW, GetWindow, DrawIconEx, AttachThreadInput, CreateDialogIndirectParamA, GetWindowLongW, MonitorFromWindow, GetSysColorBrush, EnableScrollBar, EndMenu, CheckMenuItem, CharUpperBuffW, IsIconic, GetSubMenu, GetDC, GetDesktopWindow, MessageBoxW, RegisterWindowMessageW
    GDI32.dllCreatePolygonRgn, GetTextExtentPointW, RectInRegion, SetPolyFillMode, CreateHatchBrush, GetRgnBox, CreatePatternBrush, CloseEnhMetaFile, GetMetaFileBitsEx, ExtCreateRegion, GetCharABCWidthsW, GetNearestPaletteIndex, SetWindowOrgEx
    ADVAPI32.dllRegQueryInfoKeyW, ControlService, RegQueryValueExW, OpenSCManagerW, CloseServiceHandle, RegCloseKey, SetSecurityDescriptorDacl, RegOpenKeyExW, RegConnectRegistryW, StartServiceW, RegOpenKeyExA, RegDeleteKeyA, LookupPrivilegeValueW, SetSecurityDescriptorOwner
    SHELL32.dllShell_NotifyIconW, ExtractIconExW
    ole32.dllCoTaskMemFree
    OLEAUT32.dllSafeArrayGetLBound, VariantClear, SysReAllocStringLen
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 22:12:02.096374989 CEST4971180192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:02.101249933 CEST8049711185.22.66.16192.168.2.6
    Aug 31, 2024 22:12:02.101366043 CEST4971180192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:02.101564884 CEST4971180192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:02.106291056 CEST8049711185.22.66.16192.168.2.6
    Aug 31, 2024 22:12:02.892879963 CEST8049711185.22.66.16192.168.2.6
    Aug 31, 2024 22:12:02.892997026 CEST4971180192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:03.135018110 CEST4971280192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:03.139964104 CEST8049712194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:03.140089989 CEST4971280192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:03.140216112 CEST4971280192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:03.145045042 CEST8049712194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:03.865420103 CEST8049712194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:03.865520954 CEST4971280192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:03.968437910 CEST4971380192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:03.974335909 CEST8049713108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:03.974425077 CEST4971380192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:03.974744081 CEST4971380192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:03.980139017 CEST8049713108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:04.580974102 CEST8049713108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:04.581053972 CEST4971380192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:04.708904028 CEST8049713108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:04.709002972 CEST4971380192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:04.839523077 CEST4971480192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:04.844506979 CEST8049714185.22.66.16192.168.2.6
    Aug 31, 2024 22:12:04.844584942 CEST4971480192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:04.844873905 CEST4971480192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:04.849659920 CEST8049714185.22.66.16192.168.2.6
    Aug 31, 2024 22:12:04.904422998 CEST4971380192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:04.904490948 CEST4971180192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:04.904570103 CEST4971280192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:05.637196064 CEST8049714185.22.66.16192.168.2.6
    Aug 31, 2024 22:12:05.637315989 CEST4971480192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:05.683940887 CEST4971580192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:05.690248013 CEST8049715194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:05.690326929 CEST4971580192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:05.690495014 CEST4971580192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:05.696620941 CEST8049715194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:06.377291918 CEST8049715194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:06.377422094 CEST4971580192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:06.444581985 CEST4971680192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:06.449493885 CEST8049716108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:06.449598074 CEST4971680192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:06.449778080 CEST4971680192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:06.454586983 CEST8049716108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:07.072112083 CEST8049716108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:07.072268009 CEST4971680192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:07.204195976 CEST8049716108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:07.204307079 CEST4971680192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:07.342571974 CEST4971680192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:07.342844009 CEST4971480192.168.2.6185.22.66.16
    Aug 31, 2024 22:12:07.342907906 CEST4971580192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:07.434999943 CEST4971880192.168.2.6185.22.66.15
    Aug 31, 2024 22:12:07.439778090 CEST8049718185.22.66.15192.168.2.6
    Aug 31, 2024 22:12:07.439888954 CEST4971880192.168.2.6185.22.66.15
    Aug 31, 2024 22:12:07.440087080 CEST4971880192.168.2.6185.22.66.15
    Aug 31, 2024 22:12:07.444919109 CEST8049718185.22.66.15192.168.2.6
    Aug 31, 2024 22:12:08.232270956 CEST8049718185.22.66.15192.168.2.6
    Aug 31, 2024 22:12:08.232403994 CEST4971880192.168.2.6185.22.66.15
    Aug 31, 2024 22:12:08.272567034 CEST4971980192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:08.277405024 CEST8049719194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:08.277473927 CEST4971980192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:08.277664900 CEST4971980192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:08.282424927 CEST8049719194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:08.969533920 CEST8049719194.67.87.38192.168.2.6
    Aug 31, 2024 22:12:08.969645023 CEST4971980192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:09.024843931 CEST4972080192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:09.029834986 CEST8049720108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:09.029913902 CEST4972080192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:09.030044079 CEST4972080192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:09.034830093 CEST8049720108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:09.659226894 CEST8049720108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:09.659339905 CEST4972080192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:09.793531895 CEST8049720108.156.60.94192.168.2.6
    Aug 31, 2024 22:12:09.793610096 CEST4972080192.168.2.6108.156.60.94
    Aug 31, 2024 22:12:09.942699909 CEST4971880192.168.2.6185.22.66.15
    Aug 31, 2024 22:12:09.942754984 CEST4971980192.168.2.6194.67.87.38
    Aug 31, 2024 22:12:09.942770958 CEST4972080192.168.2.6108.156.60.94
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 22:12:01.990658998 CEST4944353192.168.2.61.1.1.1
    Aug 31, 2024 22:12:02.089519024 CEST53494431.1.1.1192.168.2.6
    Aug 31, 2024 22:12:03.078284979 CEST5927253192.168.2.61.1.1.1
    Aug 31, 2024 22:12:03.134058952 CEST53592721.1.1.1192.168.2.6
    Aug 31, 2024 22:12:03.913914919 CEST5818153192.168.2.61.1.1.1
    Aug 31, 2024 22:12:03.967195034 CEST53581811.1.1.1192.168.2.6
    Aug 31, 2024 22:12:07.335412025 CEST6175553192.168.2.61.1.1.1
    Aug 31, 2024 22:12:07.429441929 CEST53617551.1.1.1192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 31, 2024 22:12:01.990658998 CEST192.168.2.61.1.1.10xb8cdStandard query (0)www.rapidfilestorage.comA (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.078284979 CEST192.168.2.61.1.1.10xa27Standard query (0)helsinki-dtc.comA (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.913914919 CEST192.168.2.61.1.1.10xf388Standard query (0)skrptfiles.tracemonitors.comA (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:07.335412025 CEST192.168.2.61.1.1.10x1701Standard query (0)www.rapidfilestorage.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 31, 2024 22:12:02.089519024 CEST1.1.1.1192.168.2.60xb8cdNo error (0)www.rapidfilestorage.comenv-3936544.jcloud.kzCNAME (Canonical name)IN (0x0001)false
    Aug 31, 2024 22:12:02.089519024 CEST1.1.1.1192.168.2.60xb8cdNo error (0)env-3936544.jcloud.kz185.22.66.16A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:02.089519024 CEST1.1.1.1192.168.2.60xb8cdNo error (0)env-3936544.jcloud.kz185.22.66.15A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.134058952 CEST1.1.1.1192.168.2.60xa27No error (0)helsinki-dtc.com194.67.87.38A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.967195034 CEST1.1.1.1192.168.2.60xf388No error (0)skrptfiles.tracemonitors.comd1u0l9f6kr1di3.cloudfront.netCNAME (Canonical name)IN (0x0001)false
    Aug 31, 2024 22:12:03.967195034 CEST1.1.1.1192.168.2.60xf388No error (0)d1u0l9f6kr1di3.cloudfront.net108.156.60.94A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.967195034 CEST1.1.1.1192.168.2.60xf388No error (0)d1u0l9f6kr1di3.cloudfront.net108.156.60.71A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.967195034 CEST1.1.1.1192.168.2.60xf388No error (0)d1u0l9f6kr1di3.cloudfront.net108.156.60.70A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:03.967195034 CEST1.1.1.1192.168.2.60xf388No error (0)d1u0l9f6kr1di3.cloudfront.net108.156.60.62A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:07.429441929 CEST1.1.1.1192.168.2.60x1701No error (0)www.rapidfilestorage.comenv-3936544.jcloud.kzCNAME (Canonical name)IN (0x0001)false
    Aug 31, 2024 22:12:07.429441929 CEST1.1.1.1192.168.2.60x1701No error (0)env-3936544.jcloud.kz185.22.66.15A (IP address)IN (0x0001)false
    Aug 31, 2024 22:12:07.429441929 CEST1.1.1.1192.168.2.60x1701No error (0)env-3936544.jcloud.kz185.22.66.16A (IP address)IN (0x0001)false
    • www.rapidfilestorage.com
    • helsinki-dtc.com
    • skrptfiles.tracemonitors.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.649711185.22.66.16805924C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:02.101564884 CEST408OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?AiNuMUXtWgCZYHVfKWdbOyZdTONuHtHNz HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: www.rapidfilestorage.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:02.892879963 CEST383INHTTP/1.1 200 OK
    Server: openresty
    Date: Sat, 31 Aug 2024 20:12:02 GMT
    Content-Type: text/plain
    Content-Length: 10
    Connection: keep-alive
    Set-Cookie: slb_route=c5ceac17a27c629461d7668b0a6b64a6; Path=/; Secure; HttpOnly
    Last-Modified: Thu, 15 Aug 2024 15:06:13 GMT
    ETag: "66be1965-a"
    Accept-Ranges: bytes
    X-Resolver-IP: 185.22.66.16
    X-Resolver-IP: 185.22.66.16
    Data Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.649712194.67.87.38805924C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:03.140216112 CEST400OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?lOUeyYkXtIeVhIGvnzBNcKeTcjKtSYTFb HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: helsinki-dtc.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:03.865420103 CEST264INHTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 31 Aug 2024 20:12:03 GMT
    Content-Type: text/plain
    Content-Length: 10
    Last-Modified: Thu, 15 Aug 2024 15:42:31 GMT
    Connection: keep-alive
    Keep-Alive: timeout=120
    ETag: "66be21e7-a"
    Accept-Ranges: bytes
    Data Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.649713108.156.60.94805924C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:03.974744081 CEST412OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?dzSWVrxeStrQsUBNHRVPipauUfjiGVmnu HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: skrptfiles.tracemonitors.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:04.580974102 CEST499INHTTP/1.1 200 OK
    Content-Type: text/plain
    Content-Length: 10
    Connection: keep-alive
    Last-Modified: Thu, 15 Aug 2024 15:54:21 GMT
    x-amz-server-side-encryption: AES256
    Accept-Ranges: bytes
    Server: AmazonS3
    Date: Sat, 31 Aug 2024 03:42:49 GMT
    ETag: "17c89252835fdab937f9923cdf66e3bf"
    X-Cache: Hit from cloudfront
    Via: 1.1 cf8597852fd073f5b8e6fed4908fe46e.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: AMS1-P2
    X-Amz-Cf-Id: sko-YMXjXYbH2Oc1NJOF2AlhBk96Ney2j8t8RB2ZLY_3NJleq10qaw==
    Age: 59356
    Aug 31, 2024 22:12:04.708904028 CEST10INData Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.649714185.22.66.16805948C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:04.844873905 CEST408OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?uievPixGmzVbKOzhfhviODoaAYahKgGMc HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: www.rapidfilestorage.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:05.637196064 CEST383INHTTP/1.1 200 OK
    Server: openresty
    Date: Sat, 31 Aug 2024 20:12:05 GMT
    Content-Type: text/plain
    Content-Length: 10
    Connection: keep-alive
    Set-Cookie: slb_route=13db8a2aaddbafa89a4e74ec4a29bdac; Path=/; Secure; HttpOnly
    Last-Modified: Thu, 15 Aug 2024 15:06:13 GMT
    ETag: "66be1965-a"
    Accept-Ranges: bytes
    X-Resolver-IP: 185.22.66.16
    X-Resolver-IP: 185.22.66.16
    Data Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    4192.168.2.649715194.67.87.38805948C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:05.690495014 CEST400OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?SlTcUfEytvXVUBrjkwquyzjEBZVOZZQwu HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: helsinki-dtc.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:06.377291918 CEST264INHTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 31 Aug 2024 20:12:06 GMT
    Content-Type: text/plain
    Content-Length: 10
    Last-Modified: Thu, 15 Aug 2024 15:42:31 GMT
    Connection: keep-alive
    Keep-Alive: timeout=120
    ETag: "66be21e7-a"
    Accept-Ranges: bytes
    Data Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    5192.168.2.649716108.156.60.94805948C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:06.449778080 CEST412OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?QstVkCRArOWIiNHaHSNSbBAvKJJxjQxpV HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: skrptfiles.tracemonitors.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:07.072112083 CEST499INHTTP/1.1 200 OK
    Content-Type: text/plain
    Content-Length: 10
    Connection: keep-alive
    Last-Modified: Thu, 15 Aug 2024 15:54:21 GMT
    x-amz-server-side-encryption: AES256
    Accept-Ranges: bytes
    Server: AmazonS3
    Date: Sat, 31 Aug 2024 05:13:05 GMT
    ETag: "17c89252835fdab937f9923cdf66e3bf"
    X-Cache: Hit from cloudfront
    Via: 1.1 d46464e02ca4f5540906664a2cfbcce2.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: AMS1-P2
    X-Amz-Cf-Id: tqOihhid7QPxxvs_-QmPEef-oIwdDDFI6pntTdKWqiLcaX7o3XDvXQ==
    Age: 59358
    Aug 31, 2024 22:12:07.204195976 CEST10INData Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    6192.168.2.649718185.22.66.15803608C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:07.440087080 CEST408OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?qpVcogWUZudKwkAahLFKQbqMKdaKllZcB HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: www.rapidfilestorage.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:08.232270956 CEST383INHTTP/1.1 200 OK
    Server: openresty
    Date: Sat, 31 Aug 2024 20:12:08 GMT
    Content-Type: text/plain
    Content-Length: 10
    Connection: keep-alive
    Set-Cookie: slb_route=3c8f624f98243f5351dd336e2290e2c3; Path=/; Secure; HttpOnly
    Last-Modified: Thu, 15 Aug 2024 15:06:13 GMT
    ETag: "66be1965-a"
    Accept-Ranges: bytes
    X-Resolver-IP: 185.22.66.15
    X-Resolver-IP: 185.22.66.15
    Data Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    7192.168.2.649719194.67.87.38803608C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:08.277664900 CEST400OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?IKZGDKvYnvDMvoqTeVDzNztzWcdsCQqtM HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: helsinki-dtc.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:08.969533920 CEST264INHTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 31 Aug 2024 20:12:08 GMT
    Content-Type: text/plain
    Content-Length: 10
    Last-Modified: Thu, 15 Aug 2024 15:42:31 GMT
    Connection: keep-alive
    Keep-Alive: timeout=120
    ETag: "66be21e7-a"
    Accept-Ranges: bytes
    Data Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    8192.168.2.649720108.156.60.94803608C:\Windows\SysWOW64\rundll32.exe
    TimestampBytes transferredDirectionData
    Aug 31, 2024 22:12:09.030044079 CEST412OUTGET /updates/ya/wrtzr_ytab_b_1/win/version.txt?ezfLlmYmbIYiCEOghMYOoPlTXEFRmQkky HTTP/1.1
    Accept: */*
    Cache-Control: no-cache
    Accept-Language: en-ch
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: skrptfiles.tracemonitors.com
    Connection: Keep-Alive
    Aug 31, 2024 22:12:09.659226894 CEST499INHTTP/1.1 200 OK
    Content-Type: text/plain
    Content-Length: 10
    Connection: keep-alive
    Last-Modified: Thu, 15 Aug 2024 15:54:21 GMT
    x-amz-server-side-encryption: AES256
    Accept-Ranges: bytes
    Server: AmazonS3
    Date: Sat, 31 Aug 2024 03:42:49 GMT
    ETag: "17c89252835fdab937f9923cdf66e3bf"
    X-Cache: Hit from cloudfront
    Via: 1.1 1b575b46b9e4dd6b829accb4ea728b00.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: AMS1-P2
    X-Amz-Cf-Id: OJKmPtYDzWa46GhDvUx3oviRgoBnT2DKiWVYjtp2QcdJowaOnUX1lw==
    Age: 59361
    Aug 31, 2024 22:12:09.793531895 CEST10INData Raw: 32 2e 30 2e 30 2e 33 32 35 35
    Data Ascii: 2.0.0.3255


    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:16:12:00
    Start date:31/08/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\PSqBbz.dll"
    Imagebase:0xd60000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:16:12:00
    Start date:31/08/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff66e660000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:16:12:00
    Start date:31/08/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1
    Imagebase:0x1c0000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:16:12:00
    Start date:31/08/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\PSqBbz.dll,#1
    Imagebase:0xc20000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:16:12:00
    Start date:31/08/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1
    Imagebase:0xc20000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:16:12:03
    Start date:31/08/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\PSqBbz.dll",#1
    Imagebase:0xc20000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly