Loading ...

Play interactive tourEdit tour

Analysis Report VCPjXmY0pr

Overview

General Information

Sample Name:VCPjXmY0pr (renamed file extension from none to exe)
Analysis ID:339438
MD5:053ddb3b6e38f9bdbc5fb51fdd44d3ac
SHA1:2f26c6f5a9dbf6bfb7690cb6949536775d1def92
SHA256:2d8151dabf891cf743e67c6f9765ee79884d024b10d265119873b0967a09b20f

Most interesting Screenshot:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Machine Learning detection for sample
Contains long sleeps (>= 3 min)
Detected potential crypto function
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • VCPjXmY0pr.exe (PID: 4792 cmdline: 'C:\Users\user\Desktop\VCPjXmY0pr.exe' MD5: 053DDB3B6E38F9BDBC5FB51FDD44D3AC)
    • explorer.exe (PID: 3424 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
VCPjXmY0pr.exeapt_RU_Turla_Kazuar_DebugView_peFeaturesTurla mimicking SysInternals Tools- peFeaturesJAG-S
    VCPjXmY0pr.exeAPT_MAL_RU_Turla_Kazuar_May20_1Detects Turla Kazuar malwareFlorian Roth
    • 0x69f62:$s1: Sysinternals
    • 0x69f74:$s1: Sysinternals
    • 0x6b4e4:$s2: Test Copyright
    • 0x69f3c:$op1: 0D 01 00 08 34 2E 38 30 2E 30 2E 30 00 00 13 01

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dllTurla_KazuarRATDetects Turla Kazuar RAT described by DrunkBinaryMarkus Neis / Florian Roth
    • 0x642:$x1: ~1.EXE

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus / Scanner detection for submitted sampleShow sources
    Source: VCPjXmY0pr.exeAvira: detected
    Antivirus detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dllAvira: detection malicious, Label: HEUR/AGEN.1126242
    Multi AV Scanner detection for submitted fileShow sources
    Source: VCPjXmY0pr.exeVirustotal: Detection: 76%Perma Link
    Source: VCPjXmY0pr.exeReversingLabs: Detection: 72%
    Machine Learning detection for sampleShow sources
    Source: VCPjXmY0pr.exeJoe Sandbox ML: detected

    Compliance:

    barindex
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeUnpacked PE file: 0.2.VCPjXmY0pr.exe.9b0000.0.unpack
    Source: VCPjXmY0pr.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll
    Source: VCPjXmY0pr.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000001.00000000.674084782.0000000005A00000.00000002.00000001.sdmp
    Source: Binary string: wscui.pdb source: explorer.exe, 00000001.00000000.674084782.0000000005A00000.00000002.00000001.sdmp
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
    Source: VCPjXmY0pr.exe, 00000000.00000002.685997706.0000000000E1A000.00000004.00000020.sdmpString found in binary or memory: http://go.micros
    Source: explorer.exe, 00000001.00000000.666551645.0000000002B50000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: VCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://jaireve.co/wp-content/languages/index.php
    Source: VCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://www.weauthenticate.co.uk/wp-content/languages/index.php
    Source: VCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://www.weauthenticate.co.uk/wp-content/languages/index.php1https://jaireve.co/wp-content/langua

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dll, type: DROPPEDMatched rule: Detects Turla Kazuar RAT described by DrunkBinary Author: Markus Neis / Florian Roth
    Source: 0.2.VCPjXmY0pr.exe.62480000.1.unpack, type: UNPACKEDPEMatched rule: Detects Turla Kazuar RAT described by DrunkBinary Author: Markus Neis / Florian Roth
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA35A03A4A
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359F31A0
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359FDCF0
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA35A02CD3
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359F0130
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359F4B70
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA35A03240
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359F3FA9
    Source: VCPjXmY0pr.exe, 00000000.00000002.685997706.0000000000E1A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs VCPjXmY0pr.exe
    Source: VCPjXmY0pr.exe, 00000000.00000002.685885452.0000000000A1E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAgent.exeN vs VCPjXmY0pr.exe
    Source: VCPjXmY0pr.exeBinary or memory string: OriginalFilenameAgent.exeN vs VCPjXmY0pr.exe
    Source: VCPjXmY0pr.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    Source: VCPjXmY0pr.exe, type: SAMPLEMatched rule: apt_RU_Turla_Kazuar_DebugView_peFeatures hash2 = 44cc7f6c2b664f15b499c7d07c78c110861d2cc82787ddaad28a5af8efc3daac, author = JAG-S, description = Turla mimicking SysInternals Tools- peFeatures, version = 2.0, reference = https://www.epicturla.com/blog/sysinturla, score = 1749c96cc1a4beb9ad4d6e037e40902fac31042fa40152f1d3794f49ed1a2b5c
    Source: VCPjXmY0pr.exe, type: SAMPLEMatched rule: APT_MAL_RU_Turla_Kazuar_May20_1 date = 2020-05-28, hash4 = 44cc7f6c2b664f15b499c7d07c78c110861d2cc82787ddaad28a5af8efc3daac, hash3 = 2d8151dabf891cf743e67c6f9765ee79884d024b10d265119873b0967a09b20f, hash2 = 1fca5f41211c800830c5f5c3e355d31a05e4c702401a61f11e25387e25eeb7fa, hash1 = 1749c96cc1a4beb9ad4d6e037e40902fac31042fa40152f1d3794f49ed1a2b5c, author = Florian Roth, description = Detects Turla Kazuar malware, reference = https://www.epicturla.com/blog/sysinturla
    Source: C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dll, type: DROPPEDMatched rule: Turla_KazuarRAT date = 2018-04-08, hash3 = 4e5a86e33e53931afe25a8cb108f53f9c7e6c6a731b0ef4f72ce638d0ea5c198, hash2 = 7594fab1aadc4fb08fb9dbb27c418e8bc7f08dadb2acf5533dc8560241ecfc1d, hash1 = 6b5d9fca6f49a044fd94c816e258bf50b1e90305d7dab2e0480349e80ed2a0fa, author = Markus Neis / Florian Roth, description = Detects Turla Kazuar RAT described by DrunkBinary, reference = https://twitter.com/DrunkBinary/status/982969891975319553
    Source: 0.2.VCPjXmY0pr.exe.62480000.1.unpack, type: UNPACKEDPEMatched rule: Turla_KazuarRAT date = 2018-04-08, hash3 = 4e5a86e33e53931afe25a8cb108f53f9c7e6c6a731b0ef4f72ce638d0ea5c198, hash2 = 7594fab1aadc4fb08fb9dbb27c418e8bc7f08dadb2acf5533dc8560241ecfc1d, hash1 = 6b5d9fca6f49a044fd94c816e258bf50b1e90305d7dab2e0480349e80ed2a0fa, author = Markus Neis / Florian Roth, description = Detects Turla Kazuar RAT described by DrunkBinary, reference = https://twitter.com/DrunkBinary/status/982969891975319553
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: apt_RU_Turla_Kazuar_DebugView_peFeatures hash2 = 44cc7f6c2b664f15b499c7d07c78c110861d2cc82787ddaad28a5af8efc3daac, author = JAG-S, description = Turla mimicking SysInternals Tools- peFeatures, version = 2.0, reference = https://www.epicturla.com/blog/sysinturla, score = 1749c96cc1a4beb9ad4d6e037e40902fac31042fa40152f1d3794f49ed1a2b5c
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: APT_MAL_RU_Turla_Kazuar_May20_1 date = 2020-05-28, hash4 = 44cc7f6c2b664f15b499c7d07c78c110861d2cc82787ddaad28a5af8efc3daac, hash3 = 2d8151dabf891cf743e67c6f9765ee79884d024b10d265119873b0967a09b20f, hash2 = 1fca5f41211c800830c5f5c3e355d31a05e4c702401a61f11e25387e25eeb7fa, hash1 = 1749c96cc1a4beb9ad4d6e037e40902fac31042fa40152f1d3794f49ed1a2b5c, author = Florian Roth, description = Detects Turla Kazuar malware, reference = https://www.epicturla.com/blog/sysinturla
    Source: 0.2.VCPjXmY0pr.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: apt_RU_Turla_Kazuar_DebugView_peFeatures hash2 = 44cc7f6c2b664f15b499c7d07c78c110861d2cc82787ddaad28a5af8efc3daac, author = JAG-S, description = Turla mimicking SysInternals Tools- peFeatures, version = 2.0, reference = https://www.epicturla.com/blog/sysinturla, score = 1749c96cc1a4beb9ad4d6e037e40902fac31042fa40152f1d3794f49ed1a2b5c
    Source: 0.2.VCPjXmY0pr.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: APT_MAL_RU_Turla_Kazuar_May20_1 date = 2020-05-28, hash4 = 44cc7f6c2b664f15b499c7d07c78c110861d2cc82787ddaad28a5af8efc3daac, hash3 = 2d8151dabf891cf743e67c6f9765ee79884d024b10d265119873b0967a09b20f, hash2 = 1fca5f41211c800830c5f5c3e355d31a05e4c702401a61f11e25387e25eeb7fa, hash1 = 1749c96cc1a4beb9ad4d6e037e40902fac31042fa40152f1d3794f49ed1a2b5c, author = Florian Roth, description = Detects Turla Kazuar malware, reference = https://www.epicturla.com/blog/sysinturla
    Source: VCPjXmY0pr.exe, JowBOtqcqvVCCqOPQrecpmBhMcCE.csCryptographic APIs: 'CreateDecryptor'
    Source: VCPjXmY0pr.exe, CTriFxnjSzLzysCjWnaasAySZUoH.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, JowBOtqcqvVCCqOPQrecpmBhMcCE.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, CTriFxnjSzLzysCjWnaasAySZUoH.csCryptographic APIs: 'CreateDecryptor'
    Source: VCPjXmY0pr.exe, xaWocZJwXjXdEaUZmSLYfVaHzeiG.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, xaWocZJwXjXdEaUZmSLYfVaHzeiG.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, eThxRpbETWdjxmVpXPSjXHAcevov.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: VCPjXmY0pr.exe, eThxRpbETWdjxmVpXPSjXHAcevov.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: classification engineClassification label: mal92.evad.winEXE@1/13@0/0
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeFile created: C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7Jump to behavior
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b8a51239-fdc0-6ddc-5b20-97bdafddcb5a}
    Source: VCPjXmY0pr.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Windows\explorer.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
    Source: C:\Windows\explorer.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Windows\explorer.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: VCPjXmY0pr.exeVirustotal: Detection: 76%
    Source: VCPjXmY0pr.exeReversingLabs: Detection: 72%
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
    Source: VCPjXmY0pr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll
    Source: VCPjXmY0pr.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000001.00000000.674084782.0000000005A00000.00000002.00000001.sdmp
    Source: Binary string: wscui.pdb source: explorer.exe, 00000001.00000000.674084782.0000000005A00000.00000002.00000001.sdmp

    Data Obfuscation:

    barindex
    Detected unpacking (overwrites its own PE header)Show sources
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeUnpacked PE file: 0.2.VCPjXmY0pr.exe.9b0000.0.unpack
    .NET source code contains potential unpackerShow sources
    Source: VCPjXmY0pr.exe, yVJzEUMWFmmqMaPSUNTXuiQpWUAo.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, yVJzEUMWFmmqMaPSUNTXuiQpWUAo.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: initial sampleStatic PE information: section where entry point is pointing to: .wtf
    Source: 7092ee1bf1e386348e9ed2a7b68b7ab2.dll.0.drStatic PE information: real checksum: 0xc809 should be: 0x5d1d
    Source: VCPjXmY0pr.exeStatic PE information: real checksum: 0x0 should be: 0x75bb3
    Source: 7092ee1bf1e386348e9ed2a7b68b7ab2.dll.0.drStatic PE information: section name: .wtf
    Source: 7092ee1bf1e386348e9ed2a7b68b7ab2.dll.0.drStatic PE information: section name: .xdata
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359FE373 push edx; retf
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeCode function: 0_2_00007FFA359F6D14 push esi; ret
    Source: VCPjXmY0pr.exe, oKNGvtPGtCTMPpOxDvUHlAChNZGw.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, DteHEPsmEtHhhwFTNYpXIIThIgSr.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, WAilIsDhwFrPIXiaBQdCthAaCvye.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, lwqQYZKBwOXSoyAQtOILpszueCCr.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', 'BESFPzKfKQDDGoimktgzsZJfmaNs', '.ctor'
    Source: VCPjXmY0pr.exe, evwJCBryWduoCpuRjHXVeSRGDCdK.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'mFvlXbOBwYFycNExDwsmdSXAUlTC'
    Source: VCPjXmY0pr.exe, TYOxYFoQUvQOzcgSAXTUIUXtTqP.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: VCPjXmY0pr.exe, KhLUrdNneVMqjOpSdoqdyvaLujbj.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, PyJJNitSfJqvXbCTYUUrzsymciYX.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, VCkDjCCDwbcJkUlwdXTPjBYmzNfQ.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: VCPjXmY0pr.exe, qJRFYGcPocAtTrfZlGrAXJMJZBPVA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: VCPjXmY0pr.exe, uOWFlXHpjsOByESGjkAeDXbtVDXrb.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: VCPjXmY0pr.exe, OKTUKVPuuDYGxITuxNrCtXxMDJoC.csHigh entropy of concatenated method names: 'uUmriooNvsGiUkwwzaOIlFvigksD', 'eRgbvDPMDOTkRPtLjFuGtoRrFmqv', 'jiImNtLestTpBtUWRnfloXVAaoQI', 'vdaBnoXZUkSrjeHxAmUiONUhcNKBA', 'uNBwbeDbCUukYLXPIhIIZtBypAIy', 'ncUStthzZpcDXiCzYSsPIhYbKNZp', 'lhRlKXDjVxAeXxyIiYlFismCXmMd', 'PvItMHIRZrKVlvCQvYJLgNNSASLM', 'tLilNWMRyDYOKxEKGLOPvKSHkUAF', 'qVnPtdRNMxbSGbuClYFvMgKPhvDHA'
    Source: VCPjXmY0pr.exe, fFukgVjYWaEFDfuLCEaeAIhjACpu.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, NTUiRuGNXCALubTLidZuPliWwwtr.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, BnlCTyVPPJbeDfVuwxBXIIwSZXSdA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, LKibmMaQProiRHPzDMvgNzgvUwDyA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, vcjGrbxppmxZxAbJTVMNjLbQdDBCA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, putmnFDFHxWOCpnQJeIPFhapTDCvA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: VCPjXmY0pr.exe, tYJxLndiqFFoadjBRcFjzCKyVPDw.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'VxDEoasEvMyvkTeBHhfKukJmOKoe'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, DteHEPsmEtHhhwFTNYpXIIThIgSr.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, WAilIsDhwFrPIXiaBQdCthAaCvye.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, lwqQYZKBwOXSoyAQtOILpszueCCr.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', 'BESFPzKfKQDDGoimktgzsZJfmaNs', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, KhLUrdNneVMqjOpSdoqdyvaLujbj.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, PyJJNitSfJqvXbCTYUUrzsymciYX.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, oKNGvtPGtCTMPpOxDvUHlAChNZGw.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, OKTUKVPuuDYGxITuxNrCtXxMDJoC.csHigh entropy of concatenated method names: 'uUmriooNvsGiUkwwzaOIlFvigksD', 'eRgbvDPMDOTkRPtLjFuGtoRrFmqv', 'jiImNtLestTpBtUWRnfloXVAaoQI', 'vdaBnoXZUkSrjeHxAmUiONUhcNKBA', 'uNBwbeDbCUukYLXPIhIIZtBypAIy', 'ncUStthzZpcDXiCzYSsPIhYbKNZp', 'lhRlKXDjVxAeXxyIiYlFismCXmMd', 'PvItMHIRZrKVlvCQvYJLgNNSASLM', 'tLilNWMRyDYOKxEKGLOPvKSHkUAF', 'qVnPtdRNMxbSGbuClYFvMgKPhvDHA'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, fFukgVjYWaEFDfuLCEaeAIhjACpu.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, NTUiRuGNXCALubTLidZuPliWwwtr.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, BnlCTyVPPJbeDfVuwxBXIIwSZXSdA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, VCkDjCCDwbcJkUlwdXTPjBYmzNfQ.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, qJRFYGcPocAtTrfZlGrAXJMJZBPVA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, uOWFlXHpjsOByESGjkAeDXbtVDXrb.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, evwJCBryWduoCpuRjHXVeSRGDCdK.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'mFvlXbOBwYFycNExDwsmdSXAUlTC'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, TYOxYFoQUvQOzcgSAXTUIUXtTqP.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'DOAlVtspoVtZsDRYZnvWSgROwMlp'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, putmnFDFHxWOCpnQJeIPFhapTDCvA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, tYJxLndiqFFoadjBRcFjzCKyVPDw.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor', 'VxDEoasEvMyvkTeBHhfKukJmOKoe'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, LKibmMaQProiRHPzDMvgNzgvUwDyA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, vcjGrbxppmxZxAbJTVMNjLbQdDBCA.csHigh entropy of concatenated method names: 'kafSqoPznidGdUKnHguLXljbXBMA', 'LvguNyxphZcgqtToZrVVsKFrHzsY', 'seeGDOBfDaOlBbBHqxuyACVwjvQmA', 'fThBgPgmraqMMhurquOFnDtCMVDY', 'VmwikgacwGaIvpXiNfPEivIVIKMDb', 'kyNfXlhdUbtDBndkvWzdgRvWlWUkA', '.ctor'
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeFile created: C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dllJump to dropped file
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\explorer.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1001
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exe TID: 1288Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\explorer.exe TID: 4780Thread sleep count: 64 > 30
    Source: C:\Windows\explorer.exe TID: 4780Thread sleep time: -128000s >= -30000s
    Source: C:\Windows\explorer.exe TID: 6240Thread sleep count: 1001 > 30
    Source: C:\Windows\explorer.exe TID: 6240Thread sleep time: -10010000s >= -30000s
    Source: C:\Windows\explorer.exe TID: 6896Thread sleep time: -922337203685477s >= -30000s
    Source: explorer.exe, 00000001.00000000.677524244.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.673659873.00000000058C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: explorer.exe, 00000001.00000000.674532575.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.677524244.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.671223228.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
    Source: explorer.exe, 00000001.00000000.673659873.00000000058C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: explorer.exe, 00000001.00000000.677640558.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
    Source: explorer.exe, 00000001.00000000.673659873.00000000058C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: explorer.exe, 00000001.00000000.677704442.000000000A784000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
    Source: explorer.exe, 00000001.00000000.673659873.00000000058C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeProcess token adjusted: Debug
    Source: C:\Windows\explorer.exeProcess token adjusted: Debug
    Source: C:\Windows\explorer.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    .NET source code references suspicious native API functionsShow sources
    Source: VCPjXmY0pr.exe, OKTUKVPuuDYGxITuxNrCtXxMDJoC.csReference to suspicious API methods: ('FnweNvyxnMVBuRzMZzQEqdtLAPrA', 'GetProcAddress@kernel32'), ('qVnPtdRNMxbSGbuClYFvMgKPhvDHA', 'CreateRemoteThread@kernel32'), ('zdYpViHCCuxgniqqamPpntrZHzZr', 'LoadLibrary@kernel32'), ('tLilNWMRyDYOKxEKGLOPvKSHkUAF', 'OpenProcess@kernel32'), ('wHieHXtQJlXHyVxhONzsxdAXelIaA', 'OpenProcessToken@advapi32')
    Source: 0.0.VCPjXmY0pr.exe.9b0000.0.unpack, OKTUKVPuuDYGxITuxNrCtXxMDJoC.csReference to suspicious API methods: ('FnweNvyxnMVBuRzMZzQEqdtLAPrA', 'GetProcAddress@kernel32'), ('qVnPtdRNMxbSGbuClYFvMgKPhvDHA', 'CreateRemoteThread@kernel32'), ('zdYpViHCCuxgniqqamPpntrZHzZr', 'LoadLibrary@kernel32'), ('tLilNWMRyDYOKxEKGLOPvKSHkUAF', 'OpenProcess@kernel32'), ('wHieHXtQJlXHyVxhONzsxdAXelIaA', 'OpenProcessToken@advapi32')
    Source: explorer.exe, 00000001.00000000.665732018.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
    Source: explorer.exe, 00000001.00000000.665998562.0000000001080000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: VCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmp, explorer.exe, 00000001.00000000.665998562.0000000001080000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000001.00000000.665998562.0000000001080000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000001.00000000.665998562.0000000001080000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000001.00000000.677640558.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Desktop\VCPjXmY0pr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsNative API1Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    VCPjXmY0pr.exe76%VirustotalBrowse
    VCPjXmY0pr.exe73%ReversingLabsByteCode-MSIL.Trojan.Cassowar
    VCPjXmY0pr.exe100%AviraTR/Crypt.XPACK.Gen
    VCPjXmY0pr.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dll100%AviraHEUR/AGEN.1126242

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    0.2.VCPjXmY0pr.exe.62480000.1.unpack100%AviraHEUR/AGEN.1126242Download File
    0.0.VCPjXmY0pr.exe.9b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
    0.2.VCPjXmY0pr.exe.9b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://www.weauthenticate.co.uk/wp-content/languages/index.php0%Avira URL Cloudsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    https://www.weauthenticate.co.uk/wp-content/languages/index.php1https://jaireve.co/wp-content/langua0%Avira URL Cloudsafe
    http://go.micros0%URL Reputationsafe
    http://go.micros0%URL Reputationsafe
    http://go.micros0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    https://jaireve.co/wp-content/languages/index.php0%Avira URL Cloudsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
      high
      http://www.fontbureau.comexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.com/designersGexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
          high
          https://www.weauthenticate.co.uk/wp-content/languages/index.phpVCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers/?explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
              high
              http://www.tiro.comexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                high
                http://www.goodfont.co.krexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://www.weauthenticate.co.uk/wp-content/languages/index.php1https://jaireve.co/wp-content/languaVCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://go.microsVCPjXmY0pr.exe, 00000000.00000002.685997706.0000000000E1A000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comlexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.typography.netDexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/cTheexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-user.htmlexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://jaireve.co/wp-content/languages/index.phpVCPjXmY0pr.exe, 00000000.00000002.688799779.0000000003011000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers8explorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                      high
                      http://www.%s.comPAexplorer.exe, 00000001.00000000.666551645.0000000002B50000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      low
                      http://www.fonts.comexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaseexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comexplorer.exe, 00000001.00000000.678657512.000000000B976000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        No contacted IP infos

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:339438
                        Start date:14.01.2021
                        Start time:03:08:55
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 36s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:VCPjXmY0pr (renamed file extension from none to exe)
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:15
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:1
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal92.evad.winEXE@1/13@0/0
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 6.3% (good quality ratio 5.5%)
                        • Quality average: 81.8%
                        • Quality standard deviation: 32.1%
                        HCA Information:
                        • Successful, ratio: 91%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        Warnings:
                        Show All
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        03:10:08API Interceptor1099x Sleep call for process: explorer.exe modified

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        No context

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dll
                        Process:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                        Category:dropped
                        Size (bytes):8704
                        Entropy (8bit):3.43117265490537
                        Encrypted:false
                        SSDEEP:96:ZfffhRFqx1h0OIs+gJvtYjCT9018zSTJlBLx4ZW5:1ffhRA1dNt+CT9c8+bhx4E
                        MD5:3A73460B3E70A0F3F6F0CBF0C73EFECF
                        SHA1:15FE33F04BA640E818A29E954D2DF5CC29646D05
                        SHA-256:3A948163073EDCD69A47F69EAFBC088C267CDE7AA752866DF516EA948BF62660
                        SHA-512:893E49E9DC3F57B93049BBD5322682EA0875E2A034DB9A74C13C7A6901464932C7C8F16A9EC97F8D4A96C8B839811FC80A41A1589FF4740310436AA33FE2D632
                        Malicious:true
                        Yara Hits:
                        • Rule: Turla_KazuarRAT, Description: Detects Turla Kazuar RAT described by DrunkBinary, Source: C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\7092ee1bf1e386348e9ed2a7b68b7ab2.dll, Author: Markus Neis / Florian Roth
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...F..V...........".................0........Hb.............................................. ......................................p..V....................P..<.......................................................................H............................text...`........................... .P`.wtf......... ......................`.`..rdata.......@......................@.P@.pdata..<....P......................@.0@.xdata..,....`......................@.0@.edata..V....p......................@.0@.idata............... ..............@.0.........................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\c34b132bff0230a28757d24f730ae477\aa898d6f9ffba4432ce9bb2a8b2154f7
                        Process:C:\Windows\explorer.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.875
                        Encrypted:false
                        SSDEEP:3:AHGaufVR:faufb
                        MD5:E8AD3C40BB7406C96C34C723E602058E
                        SHA1:54FADCACF2B8CE54A8B600D05CFAF19E4B85C20F
                        SHA-256:908969C5720C3971B4237AAF5C4B6B7FFEA9D01E9326597D7306574479D75DD5
                        SHA-512:3FB9282CD9F116AD9DC814347F096F903C607D8C4E3C6CBD31F3C97414F986BC2216E7CDA33BFBD63E26B66F67AD609B1395B17660E48CC503F719BC58EDC77F
                        Malicious:false
                        Reputation:low
                        Preview: #w...K:2..Y..
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\c34b132bff0230a28757d24f730ae477\aace0a8af5e9a62f21d9da31e5909f00
                        Process:C:\Windows\explorer.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):16
                        Entropy (8bit):3.875
                        Encrypted:false
                        SSDEEP:3:h74uK5:h65
                        MD5:2380A415BADE4A821DC65C0FBF0B4502
                        SHA1:D66BBA11FC460C1CF46A1A98AD09505C40709C30
                        SHA-256:BCC90DEDF52059B2CD9275E6214EAA7A274926B1C780D104A645F9FC13E4BFDF
                        SHA-512:437857CD1239F7FD0A701F7963DDA722BDF8D0DB539E33C96BB1FA3ECC60A804459CC0E736EEF4AFA04D466DA763CA4EEF4606E762F00EF44F950B7300DA10F3
                        Malicious:false
                        Reputation:low
                        Preview: .C7.....u.i...
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\c34b132bff0230a28757d24f730ae477\b96aff2c7cf2b4afd20609e7a7ab021c
                        Process:C:\Windows\explorer.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):80
                        Entropy (8bit):5.887492001110317
                        Encrypted:false
                        SSDEEP:3:OK/aggxrF8RzBRnim0DUUxHcBzWQVNz8:laxxB8VBRim4CzM
                        MD5:953D1568BAFDE7852BCD093EC0913C0B
                        SHA1:EC707DC054F1D17E13A167FB18EE3409A9A5F7E6
                        SHA-256:7A4DD0D6823D35E521E3D6757F52A625B3EB5EDF6E113D51556FA49C60408710
                        SHA-512:892E0F92386EA4D060DABBBD0E75950BBFEB964189704DD793581764A49EF6B8EDA75A21D2098DB2A61E18C93BA8242C4BE6CA8FEA4BD768DAD32B7784AE7868
                        Malicious:false
                        Reputation:low
                        Preview: .....[.o.E.~.C.+z@. ...4.Q.........R..gR.Gk|..}\..M_9A&...$.....[.uQ_`h.E..
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839D84BA13E
                        Process:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):112
                        Entropy (8bit):6.425614855073995
                        Encrypted:false
                        SSDEEP:3:sXNwEk8Ml+Bu0XoiRz95EPmaQki47a/zBiSaO:kyN8vKys6+8zBiK
                        MD5:04CF6AEB7D2035FF39ACDBBCC8B2527D
                        SHA1:C52200EFE8AA944C568490E82E50D9F75874A694
                        SHA-256:C38B2BAE911E4FF846A7F89568FC9ABFD742A7887AA86DEC321CF87F3D8AAC62
                        SHA-512:AAC78E59645D80658063CCA85585A9D42B8BAE8E748F3673D2A01BEBD53C09961B8C82AE2A85DE402FF791735F68252A741BDDA1E5FAE01903912ECE1B8636A7
                        Malicious:false
                        Reputation:low
                        Preview: /E...$....9B.....k.U.J.....M7b.9..s..'..t{.^A..J..}K...c..x.......-..$5.....C^......t.A%..x-.....E`..K..,.?.
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839D871C6B0
                        Process:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):112
                        Entropy (8bit):6.340706149678221
                        Encrypted:false
                        SSDEEP:3:pUtDciGq8DOSt7rUbf1vEFYi:atIicDOiIbpYYi
                        MD5:319E0F44349BF2868F0A52D6F22E7FEF
                        SHA1:A2424982B6D02A3AE491CB1C66AD0315EC7B98D6
                        SHA-256:BDD5918AB0460E88391E6480FB17055B153513C99CE28C2652521870DFF5502A
                        SHA-512:DF1CE6259192E8A6372C271628A0C63555DABD833528D2E640B281AC0C673AC5AE3129DD5F443507622669EAD2CB06C34E6A1F1020E13AA4E71A2EAE35E6B76A
                        Malicious:false
                        Reputation:low
                        Preview: s..+.@..a.....\.[=..w.........n....2....i."(...F...w.: ]....#...&+.1..4..Y6...+0N[.o@...6...p.z....I..
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839DB822E39
                        Process:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):48
                        Entropy (8bit):5.45996250072116
                        Encrypted:false
                        SSDEEP:3:6vnfE9eE6p34lDuIKfi05mo:6vfacIQ3a05mo
                        MD5:9D768A2AB59047A57AEF0EAB9E9150B2
                        SHA1:83EEAE11C1D5A20E0E25460EEF81E1082F76DB0D
                        SHA-256:8ABF552B4A6E556BC85B59AE6E9E3FB16C3EC8F854C2AE60CCC4F7AEC1D8851F
                        SHA-512:DE02C768597E92B80F9521F175F157F42EDB93677F4CC3DACD64FE623248233E2B39317264789990833DAE43ED6C5555085528DBC2984FF607EED00262D2C4DF
                        Malicious:false
                        Reputation:low
                        Preview: j.......&..Z/..|.!t.r..].&KBm..."..w...j..\.
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839E1CB7D93
                        Process:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):112
                        Entropy (8bit):6.447849006821076
                        Encrypted:false
                        SSDEEP:3:O+TBwCUvplvLspBqgryUrh9MkbfPwNVO4UC/Rt8Dq0n:ODZvplD8bmUckb3s84Uxm0n
                        MD5:0599E47354E7869D17E2F2D371FD9A4D
                        SHA1:7803D02514AB30E1F253E4D84C421C30CE1B11E7
                        SHA-256:55B8ED3B56C23F3D9248BEB993209845144AC3A5C47AD13C61B43469ED98AD42
                        SHA-512:523E40048250FCA70294E8D6772EF01B67892C88234F93F1A09C42CE2429DBF1B1D32C1778F94CE3F6166E843A7E9DBAC8A6CCF2AC0C04EFB374F4ECAC0BC608
                        Malicious:false
                        Reputation:low
                        Preview: 3,.vn6L...g..+...1....Z....jY..:#{*....t.ut.....-..)DX_.E'......n|.E.4.S...Qd....R.;.Z.V..i...$.C...J...
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839E2B523CD
                        Process:C:\Windows\explorer.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):240
                        Entropy (8bit):7.0259606872645275
                        Encrypted:false
                        SSDEEP:6:g1BKVEea8HZl9eb98ImCyn3y1wZnMKPbMYFX4B6Y7qsd:8Km85feHmPawlMKznDAld
                        MD5:A1B3A295D26298A2690581AF0F45429A
                        SHA1:8B23E45823F0737A69546206D4FE068BD60247EF
                        SHA-256:8CFAB883110C21EEEA84C7903C06CAA00E3363D8B1D4DC9DEC607572FACB5847
                        SHA-512:C4D34C54AF358FB2CBEAD88E6F7E752DCCFEB2E61FA1307594B20E764BB03AABC27440208E557771C86B5EF7C248C69959E2772956D086B7B45D513CD9B435A0
                        Malicious:false
                        Reputation:low
                        Preview: .i.Q...4U.......!.._....{...5.p........6&.T@EE.'M..O.,.f <_...`.6<.CR.Y....iC.,K|....w...)./..Rm7...\5C..(..Z.../..%.,<..7.F.........D...A..I).l....s..yU.II..0=Z..`..)Y\m.n..........d+......$.}....R..t.e.J".....tL..p'i.d&...
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839E2E27076
                        Process:C:\Windows\explorer.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):112
                        Entropy (8bit):6.443471997931137
                        Encrypted:false
                        SSDEEP:3:rrFk2aaAcIDX84Ba8eCrJKe2I53/4PR6SfudY2Z:/FmaAcIDpBAKKe2I5P4Bu5
                        MD5:695E1879159A131D5C0C4B59022ECE8B
                        SHA1:6BF6D3A77BA01036B4E1E46067EDCB03204EE36C
                        SHA-256:AE5EDC93F81ED89E59E0131A65D52F393788CF49E05D1745CCFC52987A61E746
                        SHA-512:6E4B4D8F22ACE43B1D259746C600D00C5A93F59FB37B02DF0D4382444C27E0A5188DC2EE7D0F22789EB8722D3C84EA180B39E9B4CDE6E88C92BA908EDDB95358
                        Malicious:false
                        Reputation:low
                        Preview: .w..,..\..`..ES.M..Px.R0..V.m&.%|V...3SZa.../.....[.wNBa}=...,#..i......l.....jx..W..R.u..z...J..(&.O.=z..h
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839E3016F16
                        Process:C:\Windows\explorer.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):240
                        Entropy (8bit):7.145086064205293
                        Encrypted:false
                        SSDEEP:6:a/dFNm6M9v2NxGv40aINKg2E8DEo1PeTuc4yL8ujKSFN4:aFmbh2CFJaPcuQLzjNFC
                        MD5:BE6561A67D1AB00A681AF4CB12642ECC
                        SHA1:56A0615D4CF52D94D4D8A65422431AC27A0220D0
                        SHA-256:D737A8B6845D5FE17E669CA15941817C307070AD0C9780C2E6A5981350F5F147
                        SHA-512:0256E2B6ED67E75FA7BA46C177C9B1945CF1FC693F3FBC50FECEBAFB6F1978AA9B53B8E5B27B7B02C9AB526431376A5E02579A8A0204C8A5FF612BFA1A994AF3
                        Malicious:false
                        Reputation:low
                        Preview: D#.%.....948........O.G..qIT..O...@.]Q..|..`.......8I'.O.....:7.K..9...0.;....|W..fd..a..f.F.......h8>.N...J..3..&.....YHL.6..4...W.~xz.........P..:.3J...HO.r........(y.....q..^.......7zb@.1..S7.<=c.J.6,..\._......;.*.b..1.....dk
                        C:\Users\user\AppData\Local\9de699449c084cfcaf7aae165ca409d7\f881b2c16ba8e622f4992b3af2bf31dc\08D8B839E60385D2
                        Process:C:\Windows\explorer.exe
                        File Type:DOS executable (COM, 0x8C-variant)
                        Category:dropped
                        Size (bytes):240
                        Entropy (8bit):7.132088499710445
                        Encrypted:false
                        SSDEEP:6:iEO5b4sVVXSUZReqGbGODHVbYg0sV6/Id3B:iES/bZLGSObxYD0U+x
                        MD5:A04816CC69F45D2D35B2B17E0825E516
                        SHA1:A39ED2ACB35D964DA48CA471B6C195F3CEE2DCE8
                        SHA-256:CF822EB734FE7C86232D3B73F14F75F20BC04E1D5D8AF273F2AA74009075CEAD
                        SHA-512:57B2F9B5ABA74F6007E522FC155B3AE1858DC2A685C02D4AD44B7B350E85CFB8FBC6B01AC7CF34AE1A6905D8B0FF1A248F17EAF07D87ED576982B559672FCAFB
                        Malicious:false
                        Reputation:low
                        Preview: .bd..Wr'^.)..NHA.'..y....2....Ib....n.C*...D.2.1n3$..pyB..:..b.j./..Q,*.8*yy<..u.. ..-....e...gN..-##})j.......t@.}."La.W./..'d}.0...?....Qf........]..hz.dQo..y].pJ.....S....KN....J..[.....=F.f~E.pP.i...L.'TZ..sx...v......%.~#....$
                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\VCPjXmY0pr.exe.log
                        Process:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):799
                        Entropy (8bit):5.2380578532104165
                        Encrypted:false
                        SSDEEP:12:Q3LaJcP0x8FcX8LB0hK9cLK9Vi0kaHYGLi1B01kKVdisk70Hy+/Qav:MLc98iKSKSaYgioQ9+r
                        MD5:E40C5BC96D6AB83BC7FB974CB8E061E8
                        SHA1:3C16DFDC96D788A19EABDA33C7BDD9ED50482741
                        SHA-256:3A40B63B6B44AB0E10C27B379DAC944CE97515D2686C966CB6949D20C1E4AAFD
                        SHA-512:55293DE42130B23FD18E0DC27FD92DC457CDBC5F34FD99C8C1DF8D4E8D15B69679C7B07C8DEDD837D3D1B3DB6DBC11A4DB099B9AEB86122950D060F6A9602DCD
                        Malicious:true
                        Reputation:low
                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\1201f26cb986c93f55044bb4fa22b294\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.ServiceProce#\5e91b88ac0255894c4e0248b14fc4649\System.ServiceProcess.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Configuratio#\6425e89da7aea5916b90f1899ae542fb\System.Configuration.Install.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\b12bbcf27f41d96fe44360ae0b566f9b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\454c09ea87bde1d5f545d60232083b79\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Management\ae8d6eb6689c9ca2facd0d2924080164\System.Management.ni.dll",0..

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):6.084065739720612
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        • Win32 Executable (generic) a (10002005/4) 49.75%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Windows Screen Saver (13104/52) 0.07%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        File name:VCPjXmY0pr.exe
                        File size:441344
                        MD5:053ddb3b6e38f9bdbc5fb51fdd44d3ac
                        SHA1:2f26c6f5a9dbf6bfb7690cb6949536775d1def92
                        SHA256:2d8151dabf891cf743e67c6f9765ee79884d024b10d265119873b0967a09b20f
                        SHA512:27c71d1565a7aa50f653c10e60e9b3316a7fc3817f8b38c6ef368c02b6397d803f3a4a9ec94c31c48d1a6fb24fc165aad1efb97d88a3ef7e8dabc6e3c1fdb4ea
                        SSDEEP:12288:u2xqzEzF/N1XnGuceEvjYRi8XYDfHI240uW+GciFav2zDqlhE:hZF1RK
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....TZ.........."...0.............N.... ........@.. ....................... ............@................................

                        File Icon

                        Icon Hash:00828e8e8686b000

                        Static PE Info

                        General

                        Entrypoint:0x46cf4e
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x5A54D3B4 [Tue Jan 9 14:37:40 2018 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v2.0.50727
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                        Entrypoint Preview

                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6cef40x57.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x638.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x6af540x6b000False0.478949145736data6.09544139324IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x6e0000x6380x800False0.32275390625data3.47697527169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x700000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_VERSION0x6e0a00x3a6data
                        RT_MANIFEST0x6e4480x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                        Imports

                        DLLImport
                        mscoree.dll_CorExeMain

                        Version Infos

                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightTest Copyright
                        Assembly Version4.80.0.0
                        InternalNameAgent.exe
                        FileVersion4.80.0.0
                        CompanyNameSysinternals
                        LegalTrademarksSysinternals
                        CommentsSysinternals DebugView
                        ProductNameSysinternals DebugView
                        ProductVersion4.80.0.0
                        FileDescriptionSysinternals DebugView
                        OriginalFilenameAgent.exe

                        Network Behavior

                        No network behavior found

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:03:09:41
                        Start date:14/01/2021
                        Path:C:\Users\user\Desktop\VCPjXmY0pr.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Users\user\Desktop\VCPjXmY0pr.exe'
                        Imagebase:0x9b0000
                        File size:441344 bytes
                        MD5 hash:053DDB3B6E38F9BDBC5FB51FDD44D3AC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Reputation:low

                        General

                        Start time:03:09:51
                        Start date:14/01/2021
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:
                        Imagebase:0x7ff6fee60000
                        File size:3933184 bytes
                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Reputation:high

                        Disassembly

                        Code Analysis

                        Reset < >