Loading ...

Play interactive tourEdit tour

Analysis Report SlaZL2LqI2.exe

Overview

General Information

Sample Name:SlaZL2LqI2.exe
Analysis ID:344543
MD5:9e3469f024cd186e3685505b7d2e4412
SHA1:2e3b115a155e10fc2dfe822ed6a7d6c03d1702fd
SHA256:14d9c9f0dbe84637aad5dca71f874b7fd2c11e7b476c4da126090c23b8e95536
Tags:exeFormbook

Most interesting Screenshot:

Detection

FormBook
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • SlaZL2LqI2.exe (PID: 4724 cmdline: 'C:\Users\user\Desktop\SlaZL2LqI2.exe' MD5: 9E3469F024CD186E3685505B7D2E4412)
    • AddInProcess32.exe (PID: 3560 cmdline: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe MD5: F2A47587431C466535F3C3D3427724BE)
      • WerFault.exe (PID: 4860 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 172 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: FormBook

{"Config: ": ["CONFIG_PATTERNS 0x8bbc", "KEY1_OFFSET 0x1d720", "CONFIG SIZE : 0xb5", "CONFIG OFFSET 0x1d823", "URL SIZE : 22", "searching string pattern", "strings_offset 0x1c363", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0xa9c3744d", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70b3", "0x9f715020", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121d8", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01549", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04", "0x50c2a508", "0x3e88e8bf", "0x4b6374a6", "0x72a93198", "0x85426977", "0xea193e11", "0xea653007", "0xe297c9c", "0x65399e87", "0x23609e75", "0xb92e8a5a", "0xabc89476", "0xd989572f", "0x4536ab86", "0x3476afc1", "0xaf24a63b", "0x393b9ac8", "0x414a3c70", "0x487e77f4", "0xbee1bdf6", "0xc30c49a6", "0xcb591d7f", "0x5c4ee455", "0x7c81c71d", "0x11c6f95e", "--------------------------------------------------", "Decrypted Strings", "--------------------------------------------------", "USERNAME", "LOCALAPPDATA", "USERPROFILE", "APPDATA", "TEMP", "ProgramFiles", "CommonProgramFiles", "ALLUSERSPROFILE", "/c copy \"", "/c del \"", "\\Run", "\\Policies", "\\Explorer", "\\Registry\\User", "\\Registry\\Machine", "\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "Office\\15.0\\Outlook\\Profiles\\Outlook\\", " NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\", "\\SOFTWARE\\Mozilla\\Mozilla ", "\\Mozilla", "Username: ", "Password: ", "formSubmitURL", "usernameField", "encryptedUsername", "encryptedPassword", "\\logins.json", "\\signons.sqlite", "\\Microsoft\\Vault\\", "SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins", "\\Google\\Chrome\\User Data\\Default\\Login Data", "SELECT origin_url, username_value, password_value FROM logins", ".exe", ".com", ".scr", ".pif", ".cmd", ".bat", "ms", "win", "gdi", "mfc", "vga", "igfx", "user", "help", "config", "update", "regsvc", "chkdsk", "systray", "audiodg", "certmgr", "autochk", "taskhost", "colorcpl", "services", "IconCache", "ThumbCache", "Cookies", "SeDebugPrivilege", "SeShutdownPrivilege", "\\BaseNamedObjects", "config.php", "POST ", " HTTP/1.1", "", "Host: ", "", "Connection: close", "", "Content-Length: ", "", "Cache-Control: no-cache", "", "Origin: http://", "", "User-Agent: Mozilla Firefox/4.0", "", "Content-Type: application/x-www-form-urlencoded", "", "Accept: */*", "", "Referer: http://", "", "Accept-Language: en-US", "", "Accept-Encoding: gzip, deflate", "", "dat=", "f-start", "heteltht.com", "transbordaquemultiplica.com", "ispartakulecleaner.com", "woodcutter.website", "gy88api8888.com", "forsagemagic.com", "greenqobbler.com", "piligame.com", "pcbet333.com", "superpuzzlegames.com", "jameslearyrealestate.com", "acmarketinghacks.com", "world-travel.xyz", "sprayfoampocatello.com", "anshangbao.com", "qacpilotacademy.com", "aodaicali.com", "aarusystems.com", "potion-designs.com", "bajaenvocho.com", "ourwfh.com", "upliftfurnitureconcepts.com", "almurasilnews.com", "thestillmancowboyhats.com", "blessedparfum.com", "brandceowd.com", "dekenchar.com", "leaseplein.com", "riverandrailga.com", "smartbandbtraders.com", "www-instagramhelpcenter.com", "maneinstinct.com", "jennifer-jones.com", "exonmobilerewardsplua.com", "westgateoptometry.net", "cornelldevelopment.com", "grhkj.com", "authenicblackculture.com", "feriavirtualdelibros.com", "mountresonant.life", "shopcelebratory.com", "juliaaiz.art", "fiveminutefixers.net", "limonseltzer.com", "skinsworldtrade.com", "xn--vhqqb70qmrhwmvnh0e.xyz", "rangers3.xyz", "meixia.space", "xn----7sbncclroqxy.xn--p1acf", "cindybakerdesigns.com", "ccheapvrshop.com", "ymoac.com", "well-being.international", "ymdycrea.net", "bowlboo.com", "marikajboutique.com", "ckhomecare.com", "meimingvip.com", "dwicans-8.info", "downtoearthdiner.com", "nantoeas.club", "mugephoto.com", "bestey.com", "opinnovatesmx.com", "f-end", "--------------------------------------------------", "Decrypted CnC URL", "--------------------------------------------------", "www.vitajwb.com/irux/\u0000"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x26db8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x27022:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x82f8a:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x831f4:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0xb086a:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0xb0ad4:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0xde13a:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0xde3a4:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x32b45:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x8ed17:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0xbc5f7:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0xe9ec7:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x32631:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x8e803:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0xbc0e3:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0xe99b3:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x32c47:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x8ee19:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0xbc6f9:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0xe9fc9:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x32dbf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x358d9:$sqlite3step: 68 34 1C 7B E1
    • 0x359ec:$sqlite3step: 68 34 1C 7B E1
    • 0x91aab:$sqlite3step: 68 34 1C 7B E1
    • 0x91bbe:$sqlite3step: 68 34 1C 7B E1
    • 0xbf38b:$sqlite3step: 68 34 1C 7B E1
    • 0xbf49e:$sqlite3step: 68 34 1C 7B E1
    • 0xecc5b:$sqlite3step: 68 34 1C 7B E1
    • 0xecd6e:$sqlite3step: 68 34 1C 7B E1
    • 0x35908:$sqlite3text: 68 38 2A 90 C5
    • 0x35a2d:$sqlite3text: 68 38 2A 90 C5
    • 0x91ada:$sqlite3text: 68 38 2A 90 C5
    • 0x91bff:$sqlite3text: 68 38 2A 90 C5
    • 0xbf3ba:$sqlite3text: 68 38 2A 90 C5
    • 0xbf4df:$sqlite3text: 68 38 2A 90 C5
    • 0xecc8a:$sqlite3text: 68 38 2A 90 C5
    • 0xecdaf:$sqlite3text: 68 38 2A 90 C5
    • 0x3591b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x35a43:$sqlite3blob: 68 53 D8 7F 8C
    • 0x91aed:$sqlite3blob: 68 53 D8 7F 8C
    • 0x91c15:$sqlite3blob: 68 53 D8 7F 8C
    • 0xbf3cd:$sqlite3blob: 68 53 D8 7F 8C
    00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x88e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x14675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x14777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x148ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x956a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x133dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1a4e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1b4ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 4 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.2.AddInProcess32.exe.760000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.AddInProcess32.exe.760000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a6e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b6ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.2.AddInProcess32.exe.760000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17609:$sqlite3step: 68 34 1C 7B E1
        • 0x1771c:$sqlite3step: 68 34 1C 7B E1
        • 0x17638:$sqlite3text: 68 38 2A 90 C5
        • 0x1775d:$sqlite3text: 68 38 2A 90 C5
        • 0x1764b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17773:$sqlite3blob: 68 53 D8 7F 8C

        Sigma Overview

        No Sigma rule has matched

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 2.2.AddInProcess32.exe.760000.1.unpackMalware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x8bbc", "KEY1_OFFSET 0x1d720", "CONFIG SIZE : 0xb5", "CONFIG OFFSET 0x1d823", "URL SIZE : 22", "searching string pattern", "strings_offset 0x1c363", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0xa9c3744d", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70b3", "0x9f715020", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121d8", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01549", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
        Multi AV Scanner detection for submitted fileShow sources
        Source: SlaZL2LqI2.exeVirustotal: Detection: 31%Perma Link
        Source: SlaZL2LqI2.exeReversingLabs: Detection: 30%
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPE
        Machine Learning detection for sampleShow sources
        Source: SlaZL2LqI2.exeJoe Sandbox ML: detected
        Source: 2.2.AddInProcess32.exe.760000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: SlaZL2LqI2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: SlaZL2LqI2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: AddInProcess32.pdb source: SlaZL2LqI2.exe, 00000000.00000002.261425891.0000000008ECD000.00000004.00000001.sdmp, AddInProcess32.exe, WerFault.exe, 00000005.00000002.346577564.0000000003110000.00000002.00000001.sdmp, AddInProcess32.exe.0.dr
        Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.259208534.0000000002E0A000.00000004.00000001.sdmp
        Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.259383971.0000000002DFC000.00000004.00000001.sdmp
        Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000005.00000003.259383971.0000000002DFC000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.259258652.0000000002DF0000.00000004.00000001.sdmp
        Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000005.00000003.259374983.0000000002DF6000.00000004.00000001.sdmp
        Source: Binary string: AddInProcess32.pdbpw source: SlaZL2LqI2.exe, 00000000.00000002.261425891.0000000008ECD000.00000004.00000001.sdmp, AddInProcess32.exe, 00000002.00000002.351711193.0000000000392000.00000002.00020000.sdmp, WerFault.exe, 00000005.00000002.346577564.0000000003110000.00000002.00000001.sdmp, AddInProcess32.exe.0.dr
        Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000005.00000003.261041308.0000000005011000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000005.00000003.259258652.0000000002DF0000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov esp, ebp
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then jmp 077226EEh
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: SlaZL2LqI2.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
        Source: SlaZL2LqI2.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: SlaZL2LqI2.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
        Source: SlaZL2LqI2.exe, 00000000.00000002.253723358.0000000001590000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
        Source: SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
        Source: SlaZL2LqI2.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
        Source: SlaZL2LqI2.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: SlaZL2LqI2.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
        Source: SlaZL2LqI2.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
        Source: SlaZL2LqI2.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: SlaZL2LqI2.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
        Source: SlaZL2LqI2.exe, 00000000.00000003.252985149.0000000009130000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
        Source: SlaZL2LqI2.exe, 00000000.00000003.238391843.0000000009121000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1?E
        Source: SlaZL2LqI2.exe, 00000000.00000003.252985149.0000000009130000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
        Source: SlaZL2LqI2.exe, 00000000.00000003.238391843.0000000009121000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g?E
        Source: SlaZL2LqI2.exe, 00000000.00000003.252985149.0000000009130000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
        Source: SlaZL2LqI2.exe, 00000000.00000003.238391843.0000000009121000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj?E
        Source: SlaZL2LqI2.exeString found in binary or memory: http://ocsp.digicert.com0A
        Source: SlaZL2LqI2.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: SlaZL2LqI2.exeString found in binary or memory: http://ocsp.digicert.com0H
        Source: SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
        Source: SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
        Source: SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
        Source: SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
        Source: SlaZL2LqI2.exe, 00000000.00000002.254190408.0000000003291000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: SlaZL2LqI2.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
        Source: SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
        Source: SlaZL2LqI2.exeString found in binary or memory: https://www.digicert.com/CPS0
        Source: SlaZL2LqI2.exe, 00000000.00000002.254190408.0000000003291000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
        Source: SlaZL2LqI2.exe, 00000000.00000002.254190408.0000000003291000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
        Source: SlaZL2LqI2.exe, 00000000.00000002.254190408.0000000003291000.00000004.00000001.sdmpString found in binary or memory: https://www.google.comT

        E-Banking Fraud:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06856EE8 CreateProcessAsUserW,
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0185C961
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_01852809
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0185306B
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0185EB8B
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0185B5D0
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_01856D78
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0185D458
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_01856743
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_01859E80
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0185C318
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06850A28
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06858648
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06853F40
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06853810
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06850040
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06851D50
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06855D58
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06850A18
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06858638
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06859268
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_068567F8
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06853F30
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06855099
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_068550A8
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_068574F0
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06850007
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06853801
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06855510
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06855520
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06851D42
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_06855D48
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_07722718
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_077206E0
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_07728280
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_07721F18
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0772CED8
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_07722708
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_077206D1
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0772CEC8
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_07727CE0
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_07727CD1
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_0772D9E8
        Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 2_2_00392050
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe 23F4A2CCDCE499C524CF43793FDA8E773D809514B5471C02FA5E68F0CDA7A10B
        Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 172
        Source: SlaZL2LqI2.exeStatic PE information: invalid certificate
        Source: SlaZL2LqI2.exeBinary or memory string: OriginalFilename vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exe, 00000000.00000002.260395887.0000000005990000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exe, 00000000.00000002.261425891.0000000008ECD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAddInProcess32.exeT vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exe, 00000000.00000002.260741498.0000000006440000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exe, 00000000.00000002.254118568.0000000003240000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPe6.dll" vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exeBinary or memory string: OriginalFilenameIMG_80136.exeL vs SlaZL2LqI2.exe
        Source: SlaZL2LqI2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: classification engineClassification label: mal92.troj.evad.winEXE@4/6@0/0
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SlaZL2LqI2.exe.logJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3560
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeJump to behavior
        Source: SlaZL2LqI2.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: SlaZL2LqI2.exeVirustotal: Detection: 31%
        Source: SlaZL2LqI2.exeReversingLabs: Detection: 30%
        Source: unknownProcess created: C:\Users\user\Desktop\SlaZL2LqI2.exe 'C:\Users\user\Desktop\SlaZL2LqI2.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
        Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 172
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: SlaZL2LqI2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: SlaZL2LqI2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: Binary string: AddInProcess32.pdb source: SlaZL2LqI2.exe, 00000000.00000002.261425891.0000000008ECD000.00000004.00000001.sdmp, AddInProcess32.exe, WerFault.exe, 00000005.00000002.346577564.0000000003110000.00000002.00000001.sdmp, AddInProcess32.exe.0.dr
        Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.259208534.0000000002E0A000.00000004.00000001.sdmp
        Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.259383971.0000000002DFC000.00000004.00000001.sdmp
        Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000005.00000003.259383971.0000000002DFC000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.259258652.0000000002DF0000.00000004.00000001.sdmp
        Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000005.00000003.259374983.0000000002DF6000.00000004.00000001.sdmp
        Source: Binary string: AddInProcess32.pdbpw source: SlaZL2LqI2.exe, 00000000.00000002.261425891.0000000008ECD000.00000004.00000001.sdmp, AddInProcess32.exe, 00000002.00000002.351711193.0000000000392000.00000002.00020000.sdmp, WerFault.exe, 00000005.00000002.346577564.0000000003110000.00000002.00000001.sdmp, AddInProcess32.exe.0.dr
        Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000005.00000003.261041308.0000000005011000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000005.00000003.259258652.0000000002DF0000.00000004.00000001.sdmp
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_00F27632 push es; retf
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_00F27627 push es; retf
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_00F2762C push es; retf
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_00F27600 push es; retf
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_068585F8 pushad ; retf
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeCode function: 0_2_068585FA push eax; retf
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeFile opened: C:\Users\user\Desktop\SlaZL2LqI2.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exe TID: 2900Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exe TID: 4632Thread sleep count: 34 > 30
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exe TID: 4632Thread sleep count: 129 > 30
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exe TID: 496Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exe TID: 4576Thread sleep time: -922337203685477s >= -30000s
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vmware svga
        Source: SlaZL2LqI2.exe, 00000000.00000002.260395887.0000000005990000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.347928835.0000000004D80000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vmusrvc
        Source: WerFault.exe, 00000005.00000003.344516445.0000000002E10000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vmsrvc
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vmtools
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
        Source: SlaZL2LqI2.exe, 00000000.00000002.260395887.0000000005990000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.347928835.0000000004D80000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: SlaZL2LqI2.exe, 00000000.00000002.260395887.0000000005990000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.347928835.0000000004D80000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: SlaZL2LqI2.exe, 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
        Source: SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmp, WerFault.exe, 00000005.00000003.275279827.0000000002E10000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: SlaZL2LqI2.exe, 00000000.00000002.260395887.0000000005990000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.347928835.0000000004D80000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeMemory allocated: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 760000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 760000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 760000
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 761000
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 564008
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeProcess created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeQueries volume information: C:\Users\user\Desktop\SlaZL2LqI2.exe VolumeInformation
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\SlaZL2LqI2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 2.2.AddInProcess32.exe.760000.1.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Masquerading1OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsAccess Token Manipulation1Valid Accounts1LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection311Access Token Manipulation1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion3NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDisable or Modify Tools1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection311Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        SlaZL2LqI2.exe31%VirustotalBrowse
        SlaZL2LqI2.exe30%ReversingLabsByteCode-MSIL.Trojan.Tnega
        SlaZL2LqI2.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\AddInProcess32.exe0%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\AddInProcess32.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        2.2.AddInProcess32.exe.760000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ns.adobe.cobj0%URL Reputationsafe
        http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
        http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
        http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
        http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
        http://ns.adobe.cobj?E0%Avira URL Cloudsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://ns.ado/1?E0%Avira URL Cloudsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://ns.adobe.c/g0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://ocsp.pki.goog/gsr2020%URL Reputationsafe
        http://ocsp.pki.goog/gsr2020%URL Reputationsafe
        http://ocsp.pki.goog/gsr2020%URL Reputationsafe
        http://ocsp.pki.goog/gsr2020%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        http://ns.adobe.c/g?E0%Avira URL Cloudsafe
        http://ns.ado/10%URL Reputationsafe
        http://ns.ado/10%URL Reputationsafe
        http://ns.ado/10%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://ns.adobe.cobjSlaZL2LqI2.exe, 00000000.00000003.252985149.0000000009130000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ocsp.pki.goog/gts1o1core0SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.adobe.cobj?ESlaZL2LqI2.exe, 00000000.00000003.238391843.0000000009121000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.pki.goog/GTS1O1core.crl0SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.ado/1?ESlaZL2LqI2.exe, 00000000.00000003.238391843.0000000009121000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://pki.goog/gsr2/GTS1O1.crt0SlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.adobe.c/gSlaZL2LqI2.exe, 00000000.00000003.252985149.0000000009130000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://crl.pki.goog/gsr2/gsr2.crl0?SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ocsp.pki.goog/gsr202SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://pki.goog/repository/0SlaZL2LqI2.exe, 00000000.00000002.253698687.0000000001567000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSlaZL2LqI2.exe, 00000000.00000002.254190408.0000000003291000.00000004.00000001.sdmpfalse
          high
          http://schema.org/WebPageSlaZL2LqI2.exe, 00000000.00000002.254245585.00000000032BF000.00000004.00000001.sdmpfalse
            high
            http://ns.adobe.c/g?ESlaZL2LqI2.exe, 00000000.00000003.238391843.0000000009121000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ns.ado/1SlaZL2LqI2.exe, 00000000.00000003.252985149.0000000009130000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:344543
            Start date:26.01.2021
            Start time:17:20:18
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 1s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:SlaZL2LqI2.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:19
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal92.troj.evad.winEXE@4/6@0/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 0.8% (good quality ratio 0.6%)
            • Quality average: 43.9%
            • Quality standard deviation: 32%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, HxTsr.exe, RuntimeBroker.exe, wermgr.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.42.151.234, 13.88.21.125, 172.217.23.36, 23.210.248.85, 51.104.139.180, 93.184.221.240, 51.103.5.159, 40.126.31.6, 40.126.31.4, 20.190.159.132, 40.126.31.135, 20.190.159.134, 20.190.159.138, 40.126.31.1, 40.126.31.137, 104.43.193.48
            • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, arc.msn.com, wu.azureedge.net, www.tm.a.prd.aadg.trafficmanager.net, emea1.notify.windows.com.akadns.net, login.live.com, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, www.google.com, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, client.wns.windows.com, fs.microsoft.com, wu.ec.azureedge.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net, dub2.next.a.prd.aadg.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            17:21:21API Interceptor1x Sleep call for process: SlaZL2LqI2.exe modified
            17:22:03API Interceptor1x Sleep call for process: WerFault.exe modified

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            C:\Users\user\AppData\Local\Temp\AddInProcess32.exe4NoiNHCNoU.exeGet hashmaliciousBrowse
              SoPwZKv1Mf.exeGet hashmaliciousBrowse
                bXFjrxjRlb.exeGet hashmaliciousBrowse
                  Generator.cont.exeGet hashmaliciousBrowse
                    file.exeGet hashmaliciousBrowse
                      560911_P.EXEGet hashmaliciousBrowse
                        file.exeGet hashmaliciousBrowse
                          IMG_61779.pdf.exeGet hashmaliciousBrowse
                            IMG_5391.EXEGet hashmaliciousBrowse
                              czZ769nM6r.exeGet hashmaliciousBrowse
                                IMG_1107.EXEGet hashmaliciousBrowse
                                  r3q6Bv8naR.exeGet hashmaliciousBrowse
                                    sy1RnlHl8Y.exeGet hashmaliciousBrowse
                                      qyMlTIBawC.exeGet hashmaliciousBrowse
                                        Qn2AQrgfqJ.exeGet hashmaliciousBrowse
                                          SecuriteInfo.com.Trojan.PackedNET.509.28611.exeGet hashmaliciousBrowse
                                            SecuriteInfo.com.Trojan.PackedNET.509.17348.exeGet hashmaliciousBrowse
                                              SecuriteInfo.com.Trojan.PackedNET.509.7497.exeGet hashmaliciousBrowse
                                                IMG_12283.exeGet hashmaliciousBrowse
                                                  IMG_06176.pdf.exeGet hashmaliciousBrowse

                                                    Created / dropped Files

                                                    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_AddInProcess32.e_c75c3781ccb7467b1c3e186dc1b041f2a01bea24_f4cf66e0_12a7f9a7\Report.wer
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7612
                                                    Entropy (8bit):3.7520729747903254
                                                    Encrypted:false
                                                    SSDEEP:192:BAKE/18si0xHBUZMXWOgjl/u7sYBS274It6osU:WKEd8si0BBUZMXWOgjl/u7sEX4It6osU
                                                    MD5:951B3CF85333A4D13B7B3ECD12E25D67
                                                    SHA1:7249308F590AB7A50BB7E401E487C3E3AB248BFB
                                                    SHA-256:1887E5F5F7A3A987E80F02FBD5780BF85A8141C56CF4E2998DFE3DF1708BA0C1
                                                    SHA-512:DE0784D3C3DFC8905B21C8A2BCC8CDC1831822EAAD39ECEF548769622A144AFC32B9AB4837BF2FDFAE772C128DC12D1931DA2F87945BE3489FB19CE416C1A517
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.6.1.8.4.0.8.4.3.2.2.3.1.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.6.1.8.4.0.9.0.9.7.8.5.7.5.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.9.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.5.1.a.b.6.4.7.-.d.7.a.b.-.4.5.2.c.-.b.9.d.5.-.3.f.b.1.c.c.e.8.c.f.d.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.1.4.7.e.d.e.f.-.7.7.a.f.-.4.3.1.7.-.a.f.c.9.-.4.5.b.e.5.3.e.6.d.9.2.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.d.d.I.n.P.r.o.c.e.s.s.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.d.d.I.n.P.r.o.c.e.s.s.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.e.8.-.0.0.0.1.-.0.0.1.6.-.4.e.1.a.-.3.a.b.6.4.a.f.4.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.f.d.5.e.1.2.8.2.3.d.6.b.d.e.a.c.7.2.a.5.5.8.e.7.d.d.e.9.2.2.4.0.0.0.0.0.9.0.4.!.0.0.0.0.9.0.d.f.7.1.9.2.4.1.c.e.0.4.8.2.8.f.0.d.d.4.d.3.1.d.6.8.3.f.8.4.7.9.
                                                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER6055.tmp.dmp
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 14 streams, Wed Jan 27 01:21:24 2021, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):18908
                                                    Entropy (8bit):2.0301858005637117
                                                    Encrypted:false
                                                    SSDEEP:96:5gc8//opp5Ab5WgLembAm3mHijMyRI0kNWIXYWIdIxNLE71A:26ab5WOei/2HypRZchE71A
                                                    MD5:3320E42A59D579F99E0EA704B9BAC56C
                                                    SHA1:7BC5688365A372AEBC65187F5630C1F6DCDE0BB0
                                                    SHA-256:B4B2ADCE9346BA97B0ED2F966366516DF634D94E29DC62D11C4F3E2C0459E335
                                                    SHA-512:BF34015CE02A170972C4A206FB3F8326B9C91C9F14260187CDD3D395417293B68217CEFA99672E5AAA6C6E1B3E81F4F8B55797F9D46B29905F1298D2387AB36F
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview: MDMP....... ..........`...................U...........B......t.......GenuineIntelW...........T..............`.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER624A.tmp.WERInternalMetadata.xml
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8394
                                                    Entropy (8bit):3.698912714524007
                                                    Encrypted:false
                                                    SSDEEP:192:Rrl7r3GLNi1PR606Yw1623qgmfrXSjCpr589banWsfEem:RrlsNi1p606Yq6rgmfrXSNan1fk
                                                    MD5:F4CC9F23E5CC2CA7DAAFDD355E174ED6
                                                    SHA1:54EC7FC1B7D1CA1C7B69E00365B8979A59C91E08
                                                    SHA-256:D5A43D103EF085413B271CDE5041AF8E48E6E6B8BB8025024B33D65A632BE4DB
                                                    SHA-512:2C8330504824B66D11D616112D7D3AF6141C2F5236809EAE7B7ECC6D05F0CD0A5938A3F630D435275519B9A985E9CB5D795D2B16FD0CBD215EFF312A82FEB623
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.5.6.0.<./.P.i.d.>.......
                                                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER679A.tmp.xml
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4802
                                                    Entropy (8bit):4.495533962805604
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwSD8zsx3JgtWI9/3WSC8Ba8fm8M4JfTEjMFO+q8vSEjGz8U4/Jrb7grYAd:uITfjYGSNNJ2bKjGv4/tHmLd
                                                    MD5:91289694503598DD70031B078AD460DD
                                                    SHA1:4108FFA5DEDC81D9C8F6F522E73D06B065C2DE4B
                                                    SHA-256:65FB63950E2B3634A55985815AFF6E1603746F0A6AEA33D4FCBB975FA4693A03
                                                    SHA-512:B505F7629F8649330B2357E8F2DDFD828B216A280868CC39AF3419CC28D2873E12CA641458B48E45B7AC4A41C5839D015F2A5B30BAEDDE54A23AA10E55BE04D6
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="834392" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SlaZL2LqI2.exe.log
                                                    Process:C:\Users\user\Desktop\SlaZL2LqI2.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1873
                                                    Entropy (8bit):5.355036985457214
                                                    Encrypted:false
                                                    SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovitHoxHhAHKzvr1qHj:iqXeqm00YqhQnouRqjoKtIxHeqzTwD
                                                    MD5:CDA95282F22F47DA2FDDC9E912B67FEF
                                                    SHA1:67A40582A092B5DF40C3EB61A361A2D336FC69E0
                                                    SHA-256:179E50F31095D0CFA13DCBB9CED6DEE424DFE8CEF8E05BDE1F840273F45E5F49
                                                    SHA-512:1D151D92AE982D2149C2255826C2FFB89A475A1EB9B9FE93DC3706F3016CD6B309743B36A4D7F6D68F48CE25391FDA7A2BAE42061535EEA7862460424A3A2036
                                                    Malicious:true
                                                    Reputation:moderate, very likely benign file
                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                    C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
                                                    Process:C:\Users\user\Desktop\SlaZL2LqI2.exe
                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):42080
                                                    Entropy (8bit):6.2125074198825105
                                                    Encrypted:false
                                                    SSDEEP:384:gc3JOvwWj8Gpw0A67dOpRIMKJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+QsPZw:g4JU8g17dl6Iq88MoBd7mFViqM5sL2
                                                    MD5:F2A47587431C466535F3C3D3427724BE
                                                    SHA1:90DF719241CE04828F0DD4D31D683F84790515FF
                                                    SHA-256:23F4A2CCDCE499C524CF43793FDA8E773D809514B5471C02FA5E68F0CDA7A10B
                                                    SHA-512:E9D0819478DDDA47763C7F5F617CD258D0FACBBBFFE0C7A965EDE9D0D884A6D7BB445820A3FD498B243BBD8BECBA146687B61421745E32B86272232C6F9E90D8
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: 4NoiNHCNoU.exe, Detection: malicious, Browse
                                                    • Filename: SoPwZKv1Mf.exe, Detection: malicious, Browse
                                                    • Filename: bXFjrxjRlb.exe, Detection: malicious, Browse
                                                    • Filename: Generator.cont.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: 560911_P.EXE, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: IMG_61779.pdf.exe, Detection: malicious, Browse
                                                    • Filename: IMG_5391.EXE, Detection: malicious, Browse
                                                    • Filename: czZ769nM6r.exe, Detection: malicious, Browse
                                                    • Filename: IMG_1107.EXE, Detection: malicious, Browse
                                                    • Filename: r3q6Bv8naR.exe, Detection: malicious, Browse
                                                    • Filename: sy1RnlHl8Y.exe, Detection: malicious, Browse
                                                    • Filename: qyMlTIBawC.exe, Detection: malicious, Browse
                                                    • Filename: Qn2AQrgfqJ.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.PackedNET.509.28611.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.PackedNET.509.17348.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.PackedNET.509.7497.exe, Detection: malicious, Browse
                                                    • Filename: IMG_12283.exe, Detection: malicious, Browse
                                                    • Filename: IMG_06176.pdf.exe, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..X...........w... ........@.. ...................................`.................................Hw..O....... ............f..`>...........v............................................... ............... ..H............text....W... ...X.................. ..`.rsrc... ............Z..............@..@.reloc...............d..............@..B................|w......H........#...Q...................u.......................................0..K........-..*..i....*...r...p.o....,....r...p.o....-..*.....o......o.....$...*.....o....(....(......:...(....o......r...p.o.......4........o......... ........o......s ........o!...s".....s#.......r]..prg..po$.....r...p.o$.....r...pr...po$.........s.........(%.....tB...r...p(&...&..r...p.('...s(.......o)...&..o*....(+...o,.....&...(-....*.......3..@......R...s.....s....(....*:.(/.....}P...*J.{P....o0..

                                                    Static File Info

                                                    General

                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):5.639935818547034
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    • DOS Executable Generic (2002/1) 0.01%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:SlaZL2LqI2.exe
                                                    File size:776136
                                                    MD5:9e3469f024cd186e3685505b7d2e4412
                                                    SHA1:2e3b115a155e10fc2dfe822ed6a7d6c03d1702fd
                                                    SHA256:14d9c9f0dbe84637aad5dca71f874b7fd2c11e7b476c4da126090c23b8e95536
                                                    SHA512:5b8f8702d84d1a04aa0c4ea1db3048341a70d090a5d5377fac870820b93e5f0f8c2e91bad2d38f60a631c431aff93bdd9e39ce6d09729098db2459db8502bd87
                                                    SSDEEP:12288:WXmGhHfNbxpJZ1mgWPj8MtQEMvZb19lBD:WXmGL/JZ/Wb8+QxZxD
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....R...................t...J........... ........@.. ....................... ............`................................

                                                    File Icon

                                                    Icon Hash:aaacae8e96a2c0e6

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x4b92ce
                                                    Entrypoint Section:.text
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                    Time Stamp:0x1EFD52AE [Mon Jun 23 13:44:14 1986 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:v4.0.30319
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                    Authenticode Signature

                                                    Signature Valid:false
                                                    Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                                                    Signature Validation Error:The digital signature of the object did not verify
                                                    Error Number:-2146869232
                                                    Not Before, Not After
                                                    • 5/28/2020 5:00:00 PM 6/3/2021 5:00:00 AM
                                                    Subject Chain
                                                    • CN=LLC Mail.Ru, O=LLC Mail.Ru, L=&#208;&#156;&#208;&#190;&#209;&#129;&#208;&#186;&#208;&#178;&#208;&#176;, C=RU, SERIALNUMBER=1027739850962, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RU
                                                    Version:3
                                                    Thumbprint MD5:CE53364B33A1C9E4BA3F1F1FCA294406
                                                    Thumbprint SHA-1:21DACC55B6E0B3B0E761BE03ED6EDD713489B6CE
                                                    Thumbprint SHA-256:7F03209D02816C136F811D1BF8CC3E23EA011CE37E3F0C45E277EE3DD67018E0
                                                    Serial:0DEB004E56D7FCEC1CAA8F2928D4E768

                                                    Entrypoint Preview

                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb92740x57.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x46f2.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xbc0000x17c8.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xb72d40xb7400False0.557978235846data5.60593294747IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xba0000x46f20x4800False0.154242621528data2.48712731924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xc00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_ICON0xba1300x4028data
                                                    RT_GROUP_ICON0xbe1580x14data
                                                    RT_VERSION0xbe16c0x39cdata
                                                    RT_MANIFEST0xbe5080x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                    Imports

                                                    DLLImport
                                                    mscoree.dll_CorExeMain

                                                    Version Infos

                                                    DescriptionData
                                                    Translation0x0000 0x04b0
                                                    LegalCopyrightCopyright 2005 4;@:9>CF>>5?A@<AE4D4
                                                    Assembly Version1.0.0.0
                                                    InternalNameIMG_80136.exe
                                                    FileVersion5.8.10.13
                                                    CompanyName4;@:9>CF>>5?A@<AE4D4
                                                    CommentsA7E@4HA4?@7HB;B98GH
                                                    ProductName56:53B29963AH9:F76>A
                                                    ProductVersion5.8.10.13
                                                    FileDescription56:53B29963AH9:F76>A
                                                    OriginalFilenameIMG_80136.exe

                                                    Network Behavior

                                                    Network Port Distribution

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 26, 2021 17:21:06.528923988 CET5475753192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:06.577542067 CET53547578.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:07.423810005 CET4999253192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:07.475569963 CET53499928.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:08.599344015 CET6007553192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:08.650882959 CET53600758.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:13.261482000 CET5501653192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:13.317917109 CET53550168.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:28.289279938 CET6434553192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:28.347115993 CET53643458.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:32.107415915 CET5712853192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:32.155298948 CET53571288.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:33.584187984 CET5479153192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:33.632198095 CET53547918.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:55.873316050 CET5046353192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:55.925277948 CET53504638.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:21:56.296921015 CET5039453192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:21:56.361057043 CET53503948.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:22:05.815181017 CET5853053192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:22:05.865876913 CET53585308.8.8.8192.168.2.5
                                                    Jan 26, 2021 17:22:07.925426960 CET5381353192.168.2.58.8.8.8
                                                    Jan 26, 2021 17:22:07.980906963 CET53538138.8.8.8192.168.2.5

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Jan 26, 2021 17:22:05.865876913 CET8.8.8.8192.168.2.50xd0c6No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                                                    Code Manipulations

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:17:21:11
                                                    Start date:26/01/2021
                                                    Path:C:\Users\user\Desktop\SlaZL2LqI2.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Users\user\Desktop\SlaZL2LqI2.exe'
                                                    Imagebase:0xe70000
                                                    File size:776136 bytes
                                                    MD5 hash:9E3469F024CD186E3685505B7D2E4412
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.259116287.00000000042A1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.259383306.00000000043D0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:17:21:17
                                                    Start date:26/01/2021
                                                    Path:C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
                                                    Imagebase:0x390000
                                                    File size:42080 bytes
                                                    MD5 hash:F2A47587431C466535F3C3D3427724BE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.351774917.0000000000761000.00000020.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Antivirus matches:
                                                    • Detection: 0%, Metadefender, Browse
                                                    • Detection: 0%, ReversingLabs
                                                    Reputation:moderate

                                                    General

                                                    Start time:17:21:22
                                                    Start date:26/01/2021
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 172
                                                    Imagebase:0x180000
                                                    File size:434592 bytes
                                                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >