Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wubZB5Ar1r.exe

Overview

General Information

Sample name:wubZB5Ar1r.exe
renamed because original name is a hash value
Original sample name:f2e35b7328c84a7c6719d237b43dce5d5f0268ea1bb4cb6f661393c5ff1f9f5d.exe
Analysis ID:1631787
MD5:34c1e2debc02eae2f3e460241f2b2805
SHA1:6f7daa7605b7f38aa6bbdab61c7b36c4896aa83b
SHA256:f2e35b7328c84a7c6719d237b43dce5d5f0268ea1bb4cb6f661393c5ff1f9f5d
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • wubZB5Ar1r.exe (PID: 6808 cmdline: "C:\Users\user\Desktop\wubZB5Ar1r.exe" MD5: 34C1E2DEBC02EAE2F3E460241F2B2805)
    • ramack.exe (PID: 6272 cmdline: "C:\Users\user\Desktop\wubZB5Ar1r.exe" MD5: 34C1E2DEBC02EAE2F3E460241F2B2805)
      • RegSvcs.exe (PID: 5352 cmdline: "C:\Users\user\Desktop\wubZB5Ar1r.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • ramack.exe (PID: 3900 cmdline: "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" MD5: 34C1E2DEBC02EAE2F3E460241F2B2805)
        • RegSvcs.exe (PID: 6880 cmdline: "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 6884 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ramack.exe (PID: 6912 cmdline: "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" MD5: 34C1E2DEBC02EAE2F3E460241F2B2805)
      • RegSvcs.exe (PID: 1948 cmdline: "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0000000A.00000002.1352723477.0000000003B30000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 95 88 44 24 2B 88 44 24 2F B0 07 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 23 entries
          SourceRuleDescriptionAuthorStrings
          8.2.ramack.exe.3730000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 95 88 44 24 2B 88 44 24 2F B0 07 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          13.2.ramack.exe.3b20000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 95 88 44 24 2B 88 44 24 2F B0 07 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          11.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 95 88 44 24 2B 88 44 24 2F B0 07 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          10.2.ramack.exe.3b30000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 95 88 44 24 2B 88 44 24 2F B0 07 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          11.2.RegSvcs.exe.43d2f90.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 64 entries

            System Summary

            barindex
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 496, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" , ProcessId: 6884, ProcessName: wscript.exe
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.54.122.135, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6880, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49688
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 496, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs" , ProcessId: 6884, ProcessName: wscript.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\fricandeaus\ramack.exe, ProcessId: 6272, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: wubZB5Ar1r.exeAvira: detected
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeAvira: detection malicious, Label: HEUR/AGEN.1321671
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeReversingLabs: Detection: 71%
            Source: wubZB5Ar1r.exeVirustotal: Detection: 57%Perma Link
            Source: wubZB5Ar1r.exeReversingLabs: Detection: 71%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: wubZB5Ar1r.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49687 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49689 version: TLS 1.2
            Source: Binary string: _.pdb source: RegSvcs.exe, 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2518538506.0000000002F2C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2522582110.0000000004292000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: ramack.exe, 00000008.00000003.1319535438.00000000046D0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 00000008.00000003.1319284252.0000000004530000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1346854928.00000000045E0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1348744364.0000000004440000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1479903750.0000000004640000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1481993914.00000000044A0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: ramack.exe, 00000008.00000003.1319535438.00000000046D0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 00000008.00000003.1319284252.0000000004530000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1346854928.00000000045E0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1348744364.0000000004440000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1479903750.0000000004640000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1481993914.00000000044A0000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,10_2_00452492
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00442886
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_004788BD
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,10_2_004339B6
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,10_2_0045CAFA
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00431A86
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,10_2_0044BD27
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0045DE8F FindFirstFileW,FindClose,10_2_0045DE8F
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_0044BF8B
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:49688 -> 198.54.122.135:587
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 198.54.122.135 198.54.122.135
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: global trafficTCP traffic: 192.168.2.6:49688 -> 198.54.122.135:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: mail.privateemail.com
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2517748334.000000000154D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: RegSvcs.exe, 0000000B.00000002.1486502418.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftM
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032BF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.privateemail.com
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2517748334.000000000154D000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
            Source: RegSvcs.exe, 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
            Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49687 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49689 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, SKTzxzsJw.cs.Net Code: mWXy4
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_0045A10F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_0047C81C

            System Summary

            barindex
            Source: 8.2.ramack.exe.3730000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 13.2.ramack.exe.3b20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 10.2.ramack.exe.3b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0000000A.00000002.1352723477.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000008.00000002.1321166995.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0000000B.00000002.1485213074.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 0000000D.00000002.1486295539.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,10_2_004333BE
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_040CEFC00_2_040CEFC0
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 8_2_041B58888_2_041B5888
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004096A010_2_004096A0
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0042200C10_2_0042200C
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0041A21710_2_0041A217
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0041221610_2_00412216
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0042435D10_2_0042435D
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004033C010_2_004033C0
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004125E810_2_004125E8
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0044663B10_2_0044663B
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0041380110_2_00413801
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0042096F10_2_0042096F
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004129D010_2_004129D0
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004119E310_2_004119E3
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0041C9AE10_2_0041C9AE
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0047EA6F10_2_0047EA6F
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0040FA1010_2_0040FA10
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00423C8110_2_00423C81
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00411E7810_2_00411E78
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00442E0C10_2_00442E0C
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00420EC010_2_00420EC0
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0044CF1710_2_0044CF17
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00444FD210_2_00444FD2
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_040B87E810_2_040B87E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00408C6011_2_00408C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040DC1111_2_0040DC11
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00407C3F11_2_00407C3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00418CCC11_2_00418CCC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00406CA011_2_00406CA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004028B011_2_004028B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041A4BE11_2_0041A4BE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041824411_2_00418244
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040165011_2_00401650
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00402F2011_2_00402F20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004193C411_2_004193C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041878811_2_00418788
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00402F8911_2_00402F89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00402B9011_2_00402B90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004073A011_2_004073A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02E7D9A011_2_02E7D9A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02E7CD8811_2_02E7CD88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02E70FD011_2_02E70FD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02E7D0D011_2_02E7D0D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02E7103011_2_02E71030
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688ECB011_2_0688ECB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688959011_2_06889590
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688624811_2_06886248
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688BBD811_2_0688BBD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688F41011_2_0688F410
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688000711_2_06880007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0688004011_2_06880040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06CA524811_2_06CA5248
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06CAA0E911_2_06CAA0E9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06CA61D011_2_06CA61D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06CA154011_2_06CA1540
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06CA83D811_2_06CA83D8
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 13_2_04128FC013_2_04128FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_0303CD8814_2_0303CD88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_0303D9A014_2_0303D9A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_03030FD014_2_03030FD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_0303103014_2_03031030
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_0303D0D014_2_0303D0D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_05F7958014_2_05F79580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_05F7ECA014_2_05F7ECA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_05F7BBC814_2_05F7BBC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_05F7623814_2_05F76238
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_05F7004014_2_05F70040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_05F7000714_2_05F70007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_06CE062014_2_06CE0620
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_06CE171814_2_06CE1718
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: String function: 00445AE0 appears 65 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: String function: 00445AE0 appears 65 times
            Source: wubZB5Ar1r.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 8.2.ramack.exe.3730000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 13.2.ramack.exe.3b20000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 10.2.ramack.exe.3b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0000000A.00000002.1352723477.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000008.00000002.1321166995.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0000000B.00000002.1485213074.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 0000000D.00000002.1486295539.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@14/3@2/2
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,10_2_004333BE
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,10_2_00464EAE
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeFile created: C:\Users\user\AppData\Local\fricandeausJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeFile created: C:\Users\user\AppData\Local\Temp\CharleyJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs"
            Source: wubZB5Ar1r.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: wubZB5Ar1r.exeVirustotal: Detection: 57%
            Source: wubZB5Ar1r.exeReversingLabs: Detection: 71%
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeFile read: C:\Users\user\Desktop\wubZB5Ar1r.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\wubZB5Ar1r.exe "C:\Users\user\Desktop\wubZB5Ar1r.exe"
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\Desktop\wubZB5Ar1r.exe"
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\wubZB5Ar1r.exe"
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\Desktop\wubZB5Ar1r.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\wubZB5Ar1r.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" Jump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: wubZB5Ar1r.exeStatic file information: File size 1297603 > 1048576
            Source: Binary string: _.pdb source: RegSvcs.exe, 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2518538506.0000000002F2C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2522582110.0000000004292000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: ramack.exe, 00000008.00000003.1319535438.00000000046D0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 00000008.00000003.1319284252.0000000004530000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1346854928.00000000045E0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1348744364.0000000004440000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1479903750.0000000004640000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1481993914.00000000044A0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: ramack.exe, 00000008.00000003.1319535438.00000000046D0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 00000008.00000003.1319284252.0000000004530000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1346854928.00000000045E0000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000A.00000003.1348744364.0000000004440000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1479903750.0000000004640000.00000004.00001000.00020000.00000000.sdmp, ramack.exe, 0000000D.00000003.1481993914.00000000044A0000.00000004.00001000.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: ramack.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x14a173
            Source: wubZB5Ar1r.exeStatic PE information: real checksum: 0xa961f should be: 0x14a173
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00416CB5 push ecx; ret 10_2_00416CC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041C40C push cs; iretd 11_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00423149 push eax; ret 11_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041C50E push cs; iretd 11_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004231C8 push eax; ret 11_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040E21D push ecx; ret 11_2_0040E230
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041C6BE push ebx; ret 11_2_0041C6BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06CAD0A3 push ds; retf 11_2_06CAD0B7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 14_2_06CE2880 push cs; iretd 14_2_06CE288A
            Source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Hfv1VUh6VgiUX', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Hfv1VUh6VgiUX', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Hfv1VUh6VgiUX', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Hfv1VUh6VgiUX', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Hfv1VUh6VgiUX', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeFile created: C:\Users\user\AppData\Local\fricandeaus\ramack.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbsJump to dropped file
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbsJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbsJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_0047A330
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00434418
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeAPI/Special instruction interceptor: Address: 41B54AC
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeAPI/Special instruction interceptor: Address: 40B840C
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeAPI/Special instruction interceptor: Address: 4128BE4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,11_2_004019F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 655Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3139Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2577Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1696Jump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85008
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeAPI coverage: 3.5 %
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeAPI coverage: 3.6 %
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,10_2_00452492
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00442886
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_004788BD
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,10_2_004339B6
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,10_2_0045CAFA
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00431A86
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,10_2_0044BD27
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0045DE8F FindFirstFileW,FindClose,10_2_0045DE8F
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_0044BF8B
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99655Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99355Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99243Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99101Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98878Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98526Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98148Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98031Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97922Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97812Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97703Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97592Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97484Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97375Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97266Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97141Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98671Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98452Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98342Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98230Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98082Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97954Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97828Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97718Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: ramack.exe, 0000000A.00000002.1351519408.0000000000958000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: wscript.exe, 0000000C.00000002.1452931666.000001A848B25000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: ramack.exe, 0000000D.00000002.1484776688.0000000000A87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Ta
            Source: RegSvcs.exe, 0000000B.00000002.1492906023.00000000058C4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,11_2_004019F0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_040CEE50 mov eax, dword ptr fs:[00000030h]0_2_040CEE50
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_040CEEB0 mov eax, dword ptr fs:[00000030h]0_2_040CEEB0
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_040CD800 mov eax, dword ptr fs:[00000030h]0_2_040CD800
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 8_2_041B5718 mov eax, dword ptr fs:[00000030h]8_2_041B5718
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 8_2_041B40C8 mov eax, dword ptr fs:[00000030h]8_2_041B40C8
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 8_2_041B5778 mov eax, dword ptr fs:[00000030h]8_2_041B5778
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_040B8678 mov eax, dword ptr fs:[00000030h]10_2_040B8678
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_040B86D8 mov eax, dword ptr fs:[00000030h]10_2_040B86D8
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_040B7028 mov eax, dword ptr fs:[00000030h]10_2_040B7028
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 13_2_04127800 mov eax, dword ptr fs:[00000030h]13_2_04127800
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 13_2_04128EB0 mov eax, dword ptr fs:[00000030h]13_2_04128EB0
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 13_2_04128E50 mov eax, dword ptr fs:[00000030h]13_2_04128E50
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0041F250 SetUnhandledExceptionFilter,10_2_0041F250
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0041A208
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00417DAA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040CE09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040E61C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00416F6A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004123F1 SetUnhandledExceptionFilter,11_2_004123F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FC9008Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1188008Jump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\wubZB5Ar1r.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\fricandeaus\ramack.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\fricandeaus\ramack.exe" Jump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: wubZB5Ar1r.exe, ramack.exeBinary or memory string: Shell_TrayWnd
            Source: wubZB5Ar1r.exe, ramack.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,11_2_00417A20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2519362195.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2519362195.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1489092598.00000000033D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1489092598.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6880, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1948, type: MEMORYSTR
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: ramack.exeBinary or memory string: WIN_XP
            Source: ramack.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: ramack.exeBinary or memory string: WIN_XPe
            Source: ramack.exeBinary or memory string: WIN_VISTA
            Source: ramack.exeBinary or memory string: WIN_7
            Source: ramack.exeBinary or memory string: WIN_8
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2519362195.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1489092598.00000000033D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6880, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1948, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2519362195.0000000003294000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2519362195.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1489092598.00000000033D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1489092598.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6880, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1948, type: MEMORYSTR
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2efef7e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0ee8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.5990000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4386458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.43d2f90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.2effe66.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.57c0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.RegSvcs.exe.4385570.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\wubZB5Ar1r.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,10_2_004652BE
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00476619
            Source: C:\Users\user\AppData\Local\fricandeaus\ramack.exeCode function: 10_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,10_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information111
            Scripting
            2
            Valid Accounts
            121
            Windows Management Instrumentation
            111
            Scripting
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            121
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            1
            Credentials in Registry
            3
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron2
            Registry Run Keys / Startup Folder
            21
            Access Token Manipulation
            2
            Software Packing
            NTDS138
            System Information Discovery
            Distributed Component Object Model121
            Input Capture
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets341
            Security Software Discovery
            SSH3
            Clipboard Data
            23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
            Registry Run Keys / Startup Folder
            1
            Masquerading
            Cached Domain Credentials121
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Valid Accounts
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job121
            Virtualization/Sandbox Evasion
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
            Process Injection
            Network Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631787 Sample: wubZB5Ar1r.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 36 mail.privateemail.com 2->36 38 api.ipify.org 2->38 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus / Scanner detection for submitted sample 2->60 62 9 other signatures 2->62 9 wubZB5Ar1r.exe 3 2->9         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\...\ramack.exe, PE32 9->32 dropped 15 ramack.exe 1 9->15         started        78 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->78 19 ramack.exe 12->19         started        signatures6 process7 file8 34 C:\Users\user\AppData\Roaming\...\ramack.vbs, data 15->34 dropped 44 Antivirus detection for dropped file 15->44 46 Multi AV Scanner detection for dropped file 15->46 48 Drops VBS files to the startup folder 15->48 50 Switches to a custom stack to bypass stack traces 15->50 21 ramack.exe 15->21         started        24 RegSvcs.exe 15->24         started        52 Writes to foreign memory regions 19->52 54 Maps a DLL or memory area into another process 19->54 26 RegSvcs.exe 2 19->26         started        signatures9 process10 signatures11 64 Writes to foreign memory regions 21->64 66 Maps a DLL or memory area into another process 21->66 28 RegSvcs.exe 15 2 21->28         started        68 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->68 70 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 26->70 72 Tries to steal Mail credentials (via file / registry access) 26->72 74 Tries to harvest and steal ftp login credentials 26->74 76 Tries to harvest and steal browser information (history, passwords, etc) 26->76 process12 dnsIp13 40 mail.privateemail.com 198.54.122.135, 49688, 49690, 587 NAMECHEAP-NETUS United States 28->40 42 api.ipify.org 104.26.12.205, 443, 49687, 49689 CLOUDFLARENETUS United States 28->42 80 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 28->80 82 Tries to steal Mail credentials (via file / registry access) 28->82 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            wubZB5Ar1r.exe58%VirustotalBrowse
            wubZB5Ar1r.exe71%ReversingLabsWin32.Trojan.AutoitInject
            wubZB5Ar1r.exe100%AviraHEUR/AGEN.1321671
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\fricandeaus\ramack.exe100%AviraHEUR/AGEN.1321671
            C:\Users\user\AppData\Local\fricandeaus\ramack.exe71%ReversingLabsWin32.Trojan.AutoitInject
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crl.microsoftM0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            mail.privateemail.com
            198.54.122.135
            truefalse
              high
              api.ipify.org
              104.26.12.205
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://api.ipify.orgRegSvcs.exe, 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://sectigo.com/CPS0RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://account.dyn.com/RegSvcs.exe, 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://ocsp.sectigo.com0RegSvcs.exe, 0000000B.00000002.1489092598.0000000003407000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1486502418.000000000147A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org/tRegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://mail.privateemail.comRegSvcs.exe, 0000000B.00000002.1489092598.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.00000000032BF000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000B.00000002.1489092598.0000000003381000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000E.00000002.2519362195.0000000003250000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://crl.microsoftMRegSvcs.exe, 0000000E.00000002.2523695910.0000000005944000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.26.12.205
                                  api.ipify.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  198.54.122.135
                                  mail.privateemail.comUnited States
                                  22612NAMECHEAP-NETUSfalse
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1631787
                                  Start date and time:2025-03-07 15:53:07 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 9m 8s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:18
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:wubZB5Ar1r.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:f2e35b7328c84a7c6719d237b43dce5d5f0268ea1bb4cb6f661393c5ff1f9f5d.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.expl.evad.winEXE@14/3@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 97%
                                  • Number of executed functions: 53
                                  • Number of non-executed functions: 323
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.60.203.209, 23.199.214.10
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  09:54:19API Interceptor43x Sleep call for process: RegSvcs.exe modified
                                  15:54:17AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  104.26.12.205NightFixed 1.0.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  VibeCall.exeGet hashmaliciousRHADAMANTHYSBrowse
                                  • api.ipify.org/
                                  VRChat_ERP_Setup 1.0.0.msiGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  wEY98gM1Jj.ps1Get hashmaliciousLummaC StealerBrowse
                                  • api.ipify.org/
                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  DeepLauncher.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  [Huawei] Contract for YouTube partners.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  NexoPack Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  NexoPack Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  198.54.122.135#U94f6#U884c#U8f6c#U8d26#U51ed#U8bc1.vbsGet hashmaliciousUnknownBrowse
                                    Updated Price List for 2025 Business Year.exeGet hashmaliciousSnake KeyloggerBrowse
                                      niceworkingskillgivenbetterwayofbetterthings.htaGet hashmaliciousCobalt Strike, MassLogger RATBrowse
                                        Annual Leave sheet 2025.vbsGet hashmaliciousMassLogger RATBrowse
                                          DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            cali.exeGet hashmaliciousAgentTeslaBrowse
                                              MVV ALIADO - S-REQ-19-00064 40ft 1x20.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                b9Mm2hq1pU.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  kNyZqDECXJ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    ItPTgiBC07.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      mail.privateemail.com#U94f6#U884c#U8f6c#U8d26#U51ed#U8bc1.vbsGet hashmaliciousUnknownBrowse
                                                      • 198.54.122.135
                                                      Updated Price List for 2025 Business Year.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 198.54.122.135
                                                      niceworkingskillgivenbetterwayofbetterthings.htaGet hashmaliciousCobalt Strike, MassLogger RATBrowse
                                                      • 198.54.122.135
                                                      Annual Leave sheet 2025.vbsGet hashmaliciousMassLogger RATBrowse
                                                      • 198.54.122.135
                                                      DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 198.54.122.135
                                                      cali.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 198.54.122.135
                                                      MVV ALIADO - S-REQ-19-00064 40ft 1x20.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 198.54.122.135
                                                      b9Mm2hq1pU.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 198.54.122.135
                                                      kNyZqDECXJ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 198.54.122.135
                                                      ItPTgiBC07.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 198.54.122.135
                                                      api.ipify.orgoCPGyn28rc.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      reversed-payload.bin.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      SecuriteInfo.com.Win32.CrypterX-gen.18789.13214.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      Ningbo Overdue Invoice - JAN 23,2025.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      https://ipfs.io/ipfs/bafkreieqld65z4s3qt2ewjyg6bbbyhkdl2tlzzvflxmef66o3zugau2mtu/#bgruwez@youtube.comGet hashmaliciousHTMLPhisherBrowse
                                                      • 172.67.74.152
                                                      https://ipfs.io/ipfs/bafkreieqld65z4s3qt2ewjyg6bbbyhkdl2tlzzvflxmef66o3zugau2mtu/#bgruwez@besix.comGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.26.13.205
                                                      bkHLzNaNMS.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      bkHLzNaNMS.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      datasheet.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      Korea Customs Document.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 172.67.74.152
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUSmKRflLn5sx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.64.1
                                                      HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.64.1
                                                      PayeeRemittanceNotice_ GQUMJOTASN.emlGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      UOEAjWmusE.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                      • 104.21.16.1
                                                      4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.16.1
                                                      nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.64.1
                                                      7l3CafRVv7.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                      • 104.21.80.1
                                                      C6FGS0I3yn.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.112.1
                                                      ckHregxJIq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      oCPGyn28rc.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      NAMECHEAP-NETUS1x165rHRi9.exeGet hashmaliciousFormBookBrowse
                                                      • 162.0.231.203
                                                      http://mnp2.comGet hashmaliciousUnknownBrowse
                                                      • 192.64.119.239
                                                      SEA WAYBILL, BL, INVOICE & PACKING LIST.exeGet hashmaliciousFormBookBrowse
                                                      • 162.255.118.67
                                                      rPO-20429124.exeGet hashmaliciousFormBookBrowse
                                                      • 63.250.38.223
                                                      z15NEWORDERSUPPLY0490402.exeGet hashmaliciousFormBookBrowse
                                                      • 63.250.38.122
                                                      YzvM4Dzoe3.exeGet hashmaliciousFormBookBrowse
                                                      • 162.255.118.67
                                                      Revised Invoice Vt-1307701765400112977.exeGet hashmaliciousFormBookBrowse
                                                      • 162.255.118.67
                                                      PO#10800.exeGet hashmaliciousFormBookBrowse
                                                      • 162.0.239.7
                                                      rRFQ24A.exeGet hashmaliciousFormBookBrowse
                                                      • 63.250.38.223
                                                      PURCHASE-ORDER-SINCOAUTOMATION-PO322357781-Ref 6421SINCO-AUTOMATION4533.exeGet hashmaliciousFormBookBrowse
                                                      • 63.250.38.122
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0emKRflLn5sx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.12.205
                                                      UOEAjWmusE.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                      • 104.26.12.205
                                                      zXtG0a5Gt0.exeGet hashmaliciousXWormBrowse
                                                      • 104.26.12.205
                                                      nGI2U2r41E.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.12.205
                                                      OfQ4QRmP65.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      ckHregxJIq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.12.205
                                                      OfQ4QRmP65.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      gIPDZfPhpW.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      PvAmrCZENy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.12.205
                                                      gIPDZfPhpW.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      No context
                                                      Process:C:\Users\user\Desktop\wubZB5Ar1r.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):267776
                                                      Entropy (8bit):7.8979076857842205
                                                      Encrypted:false
                                                      SSDEEP:6144:r8XoO7Fo90t5ihdSqgvPrjH/aL2xM+5qVsUMZneVViBn:rvV9W5ikuL2VFUM0iBn
                                                      MD5:03331CDCF85F31C57574D6EA0E649811
                                                      SHA1:25B6E7E89F98923FD6B833FE8602E69B5CC727FD
                                                      SHA-256:EE363C4CF2B794CA960F1C75620A07E3D57DF2F3088372A5668158837A6C54AD
                                                      SHA-512:82496DBD4A32465012152E4180A81F6B773318BAA1FBB0E6B528ED7F10BC7A40E283F9881277009026BE2C5CD8181522F8D4AD4B713542A0C18D6B4A85830D39
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...7ZS9S7YH9..4I.GSDRKB3.7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS.S3YF&.:4.F.r.S...._"7d:E64K2^y+X<Z[=o%6d >,.+Yk....4<]6.TE3v44IOGSD:[..nF.:h;.'.H.MkkF,.E.1L..,`3.<.:.:.F.-.p]'TH.J.j&9.5.5p.9If5.4e00Q.B.69R44IOGSDRKB3B7K..#QYS9Sc.H9.50I;.S.RKB3B7KD.J.XX8Z3Y.8R4NKOGSDRd.3B7[DDJ.XS9SsYH)R44KOGVDRKB3B7NDDJ7YS9SS]H9V44.tESFRK.3B'KDTJ7YS)S3IH9R44I_GSDRKB3B7KD._5Y.9S3Y(;R..HOGSDRKB3B7KDDJ7YS9S3YH9R4..NGODRKB3B7KDDJ7YS9S3YH9R44IOGS._IBsB7KDDJ7YS9S3.I9.54IOGSDRKB3B7KDDJ7YS9S3YH9R.@,73SDRS.2B7[DDJ.XS9W3YH9R44IOGSDRKb3BWe6 +C8S9.^YH9.54I!GSD.JB3B7KDDJ7YS9SsYHy|PU=.GSD.{B3B.IDD\7YS3Q3YH9R44IOGSDR.B3..976)7YS.2YHYP44.NGSdPKB3B7KDDJ7YS9.3Y.9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KDDJ7YS9S3YH9R44IOGSDRKB3B7KD
                                                      Process:C:\Users\user\Desktop\wubZB5Ar1r.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1297603
                                                      Entropy (8bit):7.504656526433487
                                                      Encrypted:false
                                                      SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCwz6OTaadvm5O/xWVAJWh:7JZoQrbTFZY1iaCw2Ya3SgOy
                                                      MD5:34C1E2DEBC02EAE2F3E460241F2B2805
                                                      SHA1:6F7DAA7605B7F38AA6BBDAB61C7B36C4896AA83B
                                                      SHA-256:F2E35B7328C84A7C6719D237B43DCE5D5F0268EA1BB4CB6F661393C5FF1F9F5D
                                                      SHA-512:4AAD67A364C7E8128021E8B168D0EE01809DE2D3B2480E4B47CCBEB26555ED7BBD72AADF90BAF9AC640D63D329F740B451606F75FD5C3F5288CE8B29262B2798
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 71%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@..........................P................@.......@.........................T.......(............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...(............T..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\fricandeaus\ramack.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):282
                                                      Entropy (8bit):3.428479355667015
                                                      Encrypted:false
                                                      SSDEEP:6:DMM8lfm3OOQdUfclzXUEZ+lX17eAlDiXeXlm6nriIM8lfQVn:DsO+vNlDQ1SAhMeXlm4mA2n
                                                      MD5:9C5705202F30E2F2D66B9EBE1260AE92
                                                      SHA1:907E48D4420385E9EE8525B17B5C94B0951371B7
                                                      SHA-256:1006FD4EFC11316DC20ECB501003864DFA3ED3D8B5CB98778B4C7569EEA29FDD
                                                      SHA-512:AF4D4573C66AFFA06733E0787A5E23057A838148D2DD4DB518FF1F57A75EAE2060933BAC7D9E2008ECA08518EE024285318640C1DD682A807AE256BF6F30DB07
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.f.r.i.c.a.n.d.e.a.u.s.\.r.a.m.a.c.k...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.504656526433487
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:wubZB5Ar1r.exe
                                                      File size:1'297'603 bytes
                                                      MD5:34c1e2debc02eae2f3e460241f2b2805
                                                      SHA1:6f7daa7605b7f38aa6bbdab61c7b36c4896aa83b
                                                      SHA256:f2e35b7328c84a7c6719d237b43dce5d5f0268ea1bb4cb6f661393c5ff1f9f5d
                                                      SHA512:4aad67a364c7e8128021e8b168d0ee01809de2d3b2480e4b47ccbeb26555ed7bbd72aadf90baf9ac640d63d329f740b451606f75fd5c3f5288ce8b29262b2798
                                                      SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCwz6OTaadvm5O/xWVAJWh:7JZoQrbTFZY1iaCw2Ya3SgOy
                                                      TLSH:1255F121B9C69036C1F323B19E7EF7AA963D79360336D19727C42E325E605416B2A733
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                      Icon Hash:1733312925935517
                                                      Entrypoint:0x4165c1
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                      Instruction
                                                      call 00007FD4207090DBh
                                                      jmp 00007FD4206FFF4Eh
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      push ebp
                                                      mov ebp, esp
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [ebp+0Ch]
                                                      mov ecx, dword ptr [ebp+10h]
                                                      mov edi, dword ptr [ebp+08h]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007FD4207000CAh
                                                      cmp edi, eax
                                                      jc 00007FD420700266h
                                                      cmp ecx, 00000080h
                                                      jc 00007FD4207000DEh
                                                      cmp dword ptr [004A9724h], 00000000h
                                                      je 00007FD4207000D5h
                                                      push edi
                                                      push esi
                                                      and edi, 0Fh
                                                      and esi, 0Fh
                                                      cmp edi, esi
                                                      pop esi
                                                      pop edi
                                                      jne 00007FD4207000C7h
                                                      jmp 00007FD4207004A2h
                                                      test edi, 00000003h
                                                      jne 00007FD4207000D6h
                                                      shr ecx, 02h
                                                      and edx, 03h
                                                      cmp ecx, 08h
                                                      jc 00007FD4207000EBh
                                                      rep movsd
                                                      jmp dword ptr [00416740h+edx*4]
                                                      mov eax, edi
                                                      mov edx, 00000003h
                                                      sub ecx, 04h
                                                      jc 00007FD4207000CEh
                                                      and eax, 03h
                                                      add ecx, eax
                                                      jmp dword ptr [00416654h+eax*4]
                                                      jmp dword ptr [00416750h+ecx*4]
                                                      nop
                                                      jmp dword ptr [004166D4h+ecx*4]
                                                      nop
                                                      inc cx
                                                      add byte ptr [eax-4BFFBE9Ah], dl
                                                      inc cx
                                                      add byte ptr [ebx], ah
                                                      ror dword ptr [edx-75F877FAh], 1
                                                      inc esi
                                                      add dword ptr [eax+468A0147h], ecx
                                                      add al, cl
                                                      jmp 00007FD422B788C7h
                                                      add esi, 03h
                                                      add edi, 03h
                                                      cmp ecx, 08h
                                                      jc 00007FD42070008Eh
                                                      rep movsd
                                                      jmp dword ptr [00000000h+edx*4]
                                                      Programming Language:
                                                      • [ C ] VS2010 SP1 build 40219
                                                      • [C++] VS2010 SP1 build 40219
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [ASM] VS2010 SP1 build 40219
                                                      • [RES] VS2010 SP1 build 40219
                                                      • [LNK] VS2010 SP1 build 40219
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                      RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                      RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                      RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                      RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                      RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                      RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                      DLLImport
                                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                      USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                      GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                      OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                      DescriptionData
                                                      FileDescription
                                                      FileVersion3, 3, 8, 1
                                                      CompiledScriptAutoIt v3 Script: 3, 3, 8, 1
                                                      Translation0x0809 0x04b0
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      EnglishUnited States
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Mar 7, 2025 15:54:17.907778025 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:17.907830954 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:17.907960892 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:17.922965050 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:17.922985077 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:19.695020914 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:19.695120096 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:19.699606895 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:19.699619055 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:19.699867010 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:19.752301931 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:19.760174036 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:19.804326057 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:20.167516947 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:20.221064091 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:20.221088886 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:20.227241039 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:20.227467060 CET44349687104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:20.227600098 CET49687443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:20.766630888 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:20.771775007 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:20.771872044 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:21.706218004 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:21.724371910 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:21.729492903 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:21.888714075 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:21.893033981 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:21.898833036 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.056427002 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.081291914 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.086376905 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247339010 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247359037 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247383118 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247402906 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247419119 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247436047 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.247483015 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.247551918 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.247551918 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.608323097 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.613399029 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.774033070 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.781523943 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.786664009 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.945784092 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:22.947494030 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:22.952629089 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.113837957 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.122169018 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:23.127262115 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.289340019 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.289695024 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:23.295176983 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.456149101 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.456573009 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:23.461700916 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.624777079 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.639945984 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:23.645572901 CET58749688198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:23.645750046 CET49688587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:31.292134047 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:31.292191982 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:31.292587996 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:31.295644045 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:31.295697927 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:32.876799107 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:32.876890898 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:32.879551888 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:32.879559040 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:32.879792929 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:32.924216032 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:33.420473099 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:33.468322039 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:33.840739965 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:33.855216026 CET44349689104.26.12.205192.168.2.6
                                                      Mar 7, 2025 15:54:33.855361938 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:33.885169029 CET49689443192.168.2.6104.26.12.205
                                                      Mar 7, 2025 15:54:34.423985958 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:34.429542065 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:34.429707050 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.225286961 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.226067066 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.231091022 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.392853975 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.393091917 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.398072958 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.559665918 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.560314894 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.565371037 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728461027 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728482008 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728492975 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728564978 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.728626966 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728638887 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728651047 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.728672981 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.728693962 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.730618000 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.735640049 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.897419930 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:35.902256012 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:35.907358885 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.069612980 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.070048094 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:36.075175047 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.243545055 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.265135050 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:36.270266056 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.433954000 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.438961983 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:36.444206953 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.607825041 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.617455959 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:36.622574091 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.795774937 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.846095085 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:36.893773079 CET49690587192.168.2.6198.54.122.135
                                                      Mar 7, 2025 15:54:36.899177074 CET58749690198.54.122.135192.168.2.6
                                                      Mar 7, 2025 15:54:36.899322987 CET49690587192.168.2.6198.54.122.135
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Mar 7, 2025 15:54:17.893616915 CET6377353192.168.2.61.1.1.1
                                                      Mar 7, 2025 15:54:17.900638103 CET53637731.1.1.1192.168.2.6
                                                      Mar 7, 2025 15:54:20.756736994 CET5020953192.168.2.61.1.1.1
                                                      Mar 7, 2025 15:54:20.765841007 CET53502091.1.1.1192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Mar 7, 2025 15:54:17.893616915 CET192.168.2.61.1.1.10x9e86Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Mar 7, 2025 15:54:20.756736994 CET192.168.2.61.1.1.10x2a3fStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Mar 7, 2025 15:54:17.900638103 CET1.1.1.1192.168.2.60x9e86No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Mar 7, 2025 15:54:17.900638103 CET1.1.1.1192.168.2.60x9e86No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Mar 7, 2025 15:54:17.900638103 CET1.1.1.1192.168.2.60x9e86No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Mar 7, 2025 15:54:20.765841007 CET1.1.1.1192.168.2.60x2a3fNo error (0)mail.privateemail.com198.54.122.135A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.649687104.26.12.2054436880C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-03-07 14:54:19 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-03-07 14:54:20 UTC426INHTTP/1.1 200 OK
                                                      Date: Fri, 07 Mar 2025 14:54:19 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 13
                                                      Connection: close
                                                      Vary: Origin
                                                      cf-cache-status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 91caed6ebfde3b94-BOS
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=21106&min_rtt=18293&rtt_var=10022&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=95571&cwnd=245&unsent_bytes=0&cid=fea8c6b9a7d34e24&ts=619&x=0"
                                                      2025-03-07 14:54:20 UTC13INData Raw: 39 38 2e 32 32 39 2e 38 35 2e 31 31 36
                                                      Data Ascii: 98.229.85.116


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.649689104.26.12.2054431948C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-03-07 14:54:33 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-03-07 14:54:33 UTC426INHTTP/1.1 200 OK
                                                      Date: Fri, 07 Mar 2025 14:54:33 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 13
                                                      Connection: close
                                                      Vary: Origin
                                                      cf-cache-status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 91caedc42e054cc9-BOS
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=17622&min_rtt=16115&rtt_var=7120&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=179708&cwnd=232&unsent_bytes=0&cid=bedc28622c0fc5cf&ts=954&x=0"
                                                      2025-03-07 14:54:33 UTC13INData Raw: 39 38 2e 32 32 39 2e 38 35 2e 31 31 36
                                                      Data Ascii: 98.229.85.116


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Mar 7, 2025 15:54:21.706218004 CET58749688198.54.122.135192.168.2.6220 PrivateEmail.com prod Mail Node
                                                      Mar 7, 2025 15:54:21.724371910 CET49688587192.168.2.6198.54.122.135EHLO 760639
                                                      Mar 7, 2025 15:54:21.888714075 CET58749688198.54.122.135192.168.2.6250-mta-06.privateemail.com
                                                      250-PIPELINING
                                                      250-SIZE 81788928
                                                      250-ETRN
                                                      250-AUTH PLAIN LOGIN
                                                      250-ENHANCEDSTATUSCODES
                                                      250-8BITMIME
                                                      250-CHUNKING
                                                      250 STARTTLS
                                                      Mar 7, 2025 15:54:21.893033981 CET49688587192.168.2.6198.54.122.135STARTTLS
                                                      Mar 7, 2025 15:54:22.056427002 CET58749688198.54.122.135192.168.2.6220 Ready to start TLS
                                                      Mar 7, 2025 15:54:35.225286961 CET58749690198.54.122.135192.168.2.6220 PrivateEmail.com prod Mail Node
                                                      Mar 7, 2025 15:54:35.226067066 CET49690587192.168.2.6198.54.122.135EHLO 760639
                                                      Mar 7, 2025 15:54:35.392853975 CET58749690198.54.122.135192.168.2.6250-mta-06.privateemail.com
                                                      250-PIPELINING
                                                      250-SIZE 81788928
                                                      250-ETRN
                                                      250-AUTH PLAIN LOGIN
                                                      250-ENHANCEDSTATUSCODES
                                                      250-8BITMIME
                                                      250-CHUNKING
                                                      250 STARTTLS
                                                      Mar 7, 2025 15:54:35.393091917 CET49690587192.168.2.6198.54.122.135STARTTLS
                                                      Mar 7, 2025 15:54:35.559665918 CET58749690198.54.122.135192.168.2.6220 Ready to start TLS

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:09:54:08
                                                      Start date:07/03/2025
                                                      Path:C:\Users\user\Desktop\wubZB5Ar1r.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\wubZB5Ar1r.exe"
                                                      Imagebase:0x400000
                                                      File size:1'297'603 bytes
                                                      MD5 hash:34C1E2DEBC02EAE2F3E460241F2B2805
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:09:54:09
                                                      Start date:07/03/2025
                                                      Path:C:\Users\user\AppData\Local\fricandeaus\ramack.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\wubZB5Ar1r.exe"
                                                      Imagebase:0x400000
                                                      File size:1'297'603 bytes
                                                      MD5 hash:34C1E2DEBC02EAE2F3E460241F2B2805
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000002.1321166995.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 71%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:09:54:13
                                                      Start date:07/03/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\wubZB5Ar1r.exe"
                                                      Imagebase:0x3a0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:09:54:13
                                                      Start date:07/03/2025
                                                      Path:C:\Users\user\AppData\Local\fricandeaus\ramack.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
                                                      Imagebase:0x400000
                                                      File size:1'297'603 bytes
                                                      MD5 hash:34C1E2DEBC02EAE2F3E460241F2B2805
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000A.00000002.1352723477.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:09:54:15
                                                      Start date:07/03/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
                                                      Imagebase:0xda0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1488412383.0000000002EBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1491469820.0000000004381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000B.00000002.1485213074.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000B.00000002.1491818259.00000000057C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1489092598.00000000033D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1489092598.00000000033D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000B.00000002.1493682070.0000000005990000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1489092598.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:12
                                                      Start time:09:54:26
                                                      Start date:07/03/2025
                                                      Path:C:\Windows\System32\wscript.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ramack.vbs"
                                                      Imagebase:0x7ff65d290000
                                                      File size:170'496 bytes
                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:09:54:26
                                                      Start date:07/03/2025
                                                      Path:C:\Users\user\AppData\Local\fricandeaus\ramack.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
                                                      Imagebase:0x400000
                                                      File size:1'297'603 bytes
                                                      MD5 hash:34C1E2DEBC02EAE2F3E460241F2B2805
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000D.00000002.1486295539.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:09:54:29
                                                      Start date:07/03/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\fricandeaus\ramack.exe"
                                                      Imagebase:0xe00000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2519362195.0000000003294000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2519362195.0000000003294000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.2519362195.00000000032BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >