Loading ...

Play interactive tourEdit tour

Analysis Report Dimmock5.exe

Overview

General Information

Sample Name:Dimmock5.exe
Analysis ID:381541
MD5:1f6c8e6472b60d49704703c99b28a4b8
SHA1:1770766f6cfb51725e035b0f38f560bf03d73fae
SHA256:e0e93e3b7866085b8384948d12a2eb613fc9eb0bc283fbbe12841a5dca11ba9f
Tags:GuLoader
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Dimmock5.exe (PID: 4708 cmdline: 'C:\Users\user\Desktop\Dimmock5.exe' MD5: 1F6C8E6472B60D49704703C99B28A4B8)
    • RegAsm.exe (PID: 5596 cmdline: 'C:\Users\user\Desktop\Dimmock5.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "kpYtlUSCkDM", "URL: ": "http://JgAptYOPYbQxfk.net", "To: ": "", "ByHost: ": "mail.palacioguevara.com:587", "Password: ": "sUUgblUr6c", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000016.00000002.728202576.0000000001351000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegAsm.exe PID: 5596JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 5596JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: RegAsm connects to smtp portShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 54.37.255.108, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, Initiated: true, ProcessId: 5596, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49754

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: RegAsm.exe.5596.22.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "kpYtlUSCkDM", "URL: ": "http://JgAptYOPYbQxfk.net", "To: ": "", "ByHost: ": "mail.palacioguevara.com:587", "Password: ": "sUUgblUr6c", "From: ": ""}
            Multi AV Scanner detection for submitted fileShow sources
            Source: Dimmock5.exeVirustotal: Detection: 56%Perma Link
            Source: Dimmock5.exeMetadefender: Detection: 24%Perma Link
            Source: Dimmock5.exeReversingLabs: Detection: 72%
            Source: Dimmock5.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: unknownHTTPS traffic detected: 172.217.23.33:443 -> 192.168.2.3:49741 version: TLS 1.2
            Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000016.00000002.736394339.0000000020E00000.00000002.00000001.sdmp

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: http://JgAptYOPYbQxfk.net
            Source: global trafficTCP traffic: 192.168.2.3:49754 -> 54.37.255.108:587
            Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficTCP traffic: 192.168.2.3:49754 -> 54.37.255.108:587
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1DECA09A recv,
            Source: unknownDNS traffic detected: queries for: doc-14-04-docs.googleusercontent.com
            Source: RegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpString found in binary or memory: http://ENtKzK.com
            Source: RegAsm.exe, 00000016.00000002.734926660.000000001E1A8000.00000004.00000001.sdmp, RegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpString found in binary or memory: http://JgAptYOPYbQxfk.net
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=1bR5iuFkkMmFeiPqo3eCvIQyKbcDGCnIO
            Source: RegAsm.exe, 00000016.00000002.728202576.0000000001351000.00000040.00000001.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1bR5iuFkkMmFeiPqo3eCvIQyKbcDGCnIO8
            Source: RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpString found in binary or memory: https://pki.goog/repository/0
            Source: RegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownHTTPS traffic detected: 172.217.23.33:443 -> 192.168.2.3:49741 version: TLS 1.2
            Source: Dimmock5.exe, 00000000.00000002.457921405.000000000060A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess Stats: CPU usage > 98%
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_01353325 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1DECB0BA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1DECB089 NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E9938
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2EEE08
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E6310
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E7A10
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E0860
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E4B70
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E0CA0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E2290
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E6B90
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E8AE0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_2029EAEC
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_20298320
            Source: Dimmock5.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Dimmock5.exe, 00000000.00000002.457965940.00000000020A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Dimmock5.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: Dimmock5.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@3/1@2/2
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1DECAF3E AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1DECAF07 AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5856:120:WilError_01
            Source: Dimmock5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Dimmock5.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Dimmock5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Dimmock5.exeVirustotal: Detection: 56%
            Source: Dimmock5.exeMetadefender: Detection: 24%
            Source: Dimmock5.exeReversingLabs: Detection: 72%
            Source: unknownProcess created: C:\Users\user\Desktop\Dimmock5.exe 'C:\Users\user\Desktop\Dimmock5.exe'
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\Dimmock5.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000016.00000002.736394339.0000000020E00000.00000002.00000001.sdmp

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000016.00000002.728202576.0000000001351000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5596, type: MEMORY
            Source: C:\Users\user\Desktop\Dimmock5.exeCode function: 0_2_00404CCD push FFFFFF83h; iretd
            Source: C:\Users\user\Desktop\Dimmock5.exeCode function: 0_2_00404D0C push ss; iretd
            Source: C:\Users\user\Desktop\Dimmock5.exeCode function: 0_2_00406126 push ss; ret
            Source: C:\Users\user\Desktop\Dimmock5.exeCode function: 0_2_00401E1C push esp; retf 0040h
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_1D2E35F0 push ebp; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_2029C6EA push esp; retf
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Dimmock5.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\Dimmock5.exeRDTSC instruction interceptor: First address: 000000000052193C second address: 000000000052193C instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F8844813058h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e cmp ebx, 077948D8h 0x00000024 test dl, bl 0x00000026 add edi, edx 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007F8844813039h 0x0000002e test edx, edx 0x00000030 push ecx 0x00000031 call 00007F8844813079h 0x00000036 call 00007F8844813068h 0x0000003b lfence 0x0000003e mov edx, dword ptr [7FFE0014h] 0x00000044 lfence 0x00000047 ret 0x00000048 mov esi, edx 0x0000004a pushad 0x0000004b rdtsc
            Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFunction Chain: systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,memAlloc,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,memAlloc,memAlloc
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exe, 00000016.00000002.728202576.0000000001351000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEF9
            Source: Dimmock5.exe, 00000000.00000002.457913128.0000000000600000.00000004.00000020.sdmpBinary or memory string: CC:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEEL
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\Dimmock5.exeRDTSC instruction interceptor: First address: 000000000052193C second address: 000000000052193C instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F8844813058h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e cmp ebx, 077948D8h 0x00000024 test dl, bl 0x00000026 add edi, edx 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007F8844813039h 0x0000002e test edx, edx 0x00000030 push ecx 0x00000031 call 00007F8844813079h 0x00000036 call 00007F8844813068h 0x0000003b lfence 0x0000003e mov edx, dword ptr [7FFE0014h] 0x00000044 lfence 0x00000047 ret 0x00000048 mov esi, edx 0x0000004a pushad 0x0000004b rdtsc
            Source: C:\Users\user\Desktop\Dimmock5.exeRDTSC instruction interceptor: First address: 0000000000521A07 second address: 0000000000521A07 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F884475F716h 0x0000001d popad 0x0000001e cmp bx, cx 0x00000021 call 00007F884475E363h 0x00000026 lfence 0x00000029 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001351A07 second address: 0000000001351A07 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F8844814416h 0x0000001d popad 0x0000001e cmp bx, cx 0x00000021 call 00007F8844813063h 0x00000026 lfence 0x00000029 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_01351A04 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 701
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1736Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1736Thread sleep time: -21030000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1736Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 1736Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: RegAsm.exe, 00000016.00000002.728202576.0000000001351000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exef9
            Source: RegAsm.exe, 00000016.00000002.735866714.0000000020640000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: Dimmock5.exe, 00000000.00000002.457913128.0000000000600000.00000004.00000020.sdmpBinary or memory string: cC:\Program Files\Qemu-ga\qemu-ga.exeel
            Source: RegAsm.exe, 00000016.00000002.735866714.0000000020640000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 00000016.00000002.735866714.0000000020640000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: RegAsm.exe, 00000016.00000002.735866714.0000000020640000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_01351A04 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_0135219B LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_01353025 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_0135187E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_01352B6F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 22_2_01352943 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard
            Source: RegAsm.exe, 00000016.00000002.729585344.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000016.00000002.729585344.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000016.00000002.729585344.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000016.00000002.729585344.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5596, type: MEMORY
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: Yara matchFile source: 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5596, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5596, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Access Token Manipulation1Disable or Modify Tools11OS Credential Dumping2Security Software Discovery631Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection2Virtualization/Sandbox Evasion341Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Access Token Manipulation1Credentials in Registry1Virtualization/Sandbox Evasion341SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection2NTDSApplication Window Discovery1Distributed Component Object ModelData from Local System2Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol112Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsSystem Information Discovery314VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            Dimmock5.exe57%VirustotalBrowse
            Dimmock5.exe27%MetadefenderBrowse
            Dimmock5.exe72%ReversingLabsWin32.Trojan.GuLoader

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            palacioguevara.com0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://ENtKzK.com0%Avira URL Cloudsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://JgAptYOPYbQxfk.net0%Avira URL Cloudsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            palacioguevara.com
            54.37.255.108
            truetrueunknown
            googlehosted.l.googleusercontent.com
            172.217.23.33
            truefalse
              high
              doc-14-04-docs.googleusercontent.com
              unknown
              unknownfalse
                high
                mail.palacioguevara.com
                unknown
                unknowntrue
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://JgAptYOPYbQxfk.nettrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSRegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://pki.goog/gsr2/GTS1O1.crt0RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://ENtKzK.comRegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.pki.goog/gsr2/gsr2.crl0?RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://pki.goog/repository/0RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://crl.pki.goog/GTS1O1core.crl0RegAsm.exe, 00000016.00000003.685186556.0000000001681000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  54.37.255.108
                  palacioguevara.comFrance
                  16276OVHFRtrue
                  172.217.23.33
                  googlehosted.l.googleusercontent.comUnited States
                  15169GOOGLEUSfalse

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:381541
                  Start date:03.04.2021
                  Start time:21:26:12
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 9m 0s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Dimmock5.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:32
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.evad.winEXE@3/1@2/2
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 67% (good quality ratio 41%)
                  • Quality average: 41.7%
                  • Quality standard deviation: 40%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240s for sample files taking high CPU consumption
                  Warnings:
                  Show All
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • TCP Packets have been reduced to 100
                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 40.88.32.150, 93.184.220.29, 168.61.161.212, 52.255.188.83, 104.43.139.144, 104.42.151.234, 184.30.24.56, 20.190.159.131, 40.126.31.140, 40.126.31.136, 40.126.31.3, 40.126.31.7, 40.126.31.9, 40.126.31.142, 40.126.31.2, 20.82.209.183, 92.122.213.247, 92.122.213.194, 20.54.26.129, 20.82.210.154, 172.217.20.238, 52.155.217.156
                  • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, ocsp.digicert.com, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, login.msa.msidentity.com, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  21:29:05API Interceptor1029x Sleep call for process: RegAsm.exe modified

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  OVHFRdocument-1302325198.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1031166636.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-2021014062.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1568991333.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1012037614.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1307680126.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-986812161.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-550881172.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1042699213.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1455377818.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-980795635.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-340500177.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-921217151.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1500258943.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1823104059.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1434617389.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-103083228.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-1913529948.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-758557531.xlsGet hashmaliciousBrowse
                  • 198.50.218.68
                  document-707357347.xlsGet hashmaliciousBrowse
                  • 198.50.218.68

                  JA3 Fingerprints

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  37f463bf4616ecd445d4a1937da06e19pQlSDfwyYkf.jsGet hashmaliciousBrowse
                  • 172.217.23.33
                  Balance payment..exeGet hashmaliciousBrowse
                  • 172.217.23.33
                  pQlSDfwyYkf.jsGet hashmaliciousBrowse
                  • 172.217.23.33
                  document-1641473761.xlsGet hashmaliciousBrowse
                  • 172.217.23.33
                  ObJRDAd8jZ.exeGet hashmaliciousBrowse
                  • 172.217.23.33
                  SecuriteInfo.com.Trojan.Encoder.33750.22954.exeGet hashmaliciousBrowse
                  • 172.217.23.33
                  yKthoYkcfg.exeGet hashmaliciousBrowse
                  • 172.217.23.33
                  Confirmation Payment Receipt.docGet hashmaliciousBrowse
                  • 172.217.23.33
                  Friday, April 2nd, 2021, 20210402062906.8CE1B73ADE2A192C@compassionarmy.com.htmGet hashmaliciousBrowse
                  • 172.217.23.33
                  documents-602438418.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  1006.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  262.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  1193.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  1094.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  1366.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  2086.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  1430.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  581.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  3324.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33
                  871.xlsmGet hashmaliciousBrowse
                  • 172.217.23.33

                  Dropped Files

                  No context

                  Created / dropped Files

                  \Device\ConDrv
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):30
                  Entropy (8bit):3.964735178725505
                  Encrypted:false
                  SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                  MD5:9F754B47B351EF0FC32527B541420595
                  SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                  SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                  SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: NordVPN directory not found!..

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.5051992825729466
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.15%
                  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Dimmock5.exe
                  File size:57344
                  MD5:1f6c8e6472b60d49704703c99b28a4b8
                  SHA1:1770766f6cfb51725e035b0f38f560bf03d73fae
                  SHA256:e0e93e3b7866085b8384948d12a2eb613fc9eb0bc283fbbe12841a5dca11ba9f
                  SHA512:9e7e671c36f9f7a7206e236a5932dcefdecee4781fcb105e9c7fc458e0632383b4982cf2401e0ec7dc5eafd4619b888a74ac1b06983aa1d67d9493c85f55c8db
                  SSDEEP:768:5hf6jt9ZzkkIH1f6W+iitWmyQJkVWy+qaEmTqtid:5d6jtH9IHNKNWHtIt
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...~ae`.....................0....................@................

                  File Icon

                  Icon Hash:20047c7c70f0e004

                  Static PE Info

                  General

                  Entrypoint:0x40169c
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x6065617E [Thu Apr 1 06:00:30 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:b983fc96c0bd34be8388eeea33042759

                  Entrypoint Preview

                  Instruction
                  push 00401874h
                  call 00007F8844ED7FB5h
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  xor byte ptr [eax], al
                  add byte ptr [eax], al
                  inc eax
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add dh, cl
                  bound edi, dword ptr [esi-74DBD20Eh]
                  dec ebx
                  sahf
                  mov bh, D0h
                  mov ah, 21h
                  stc
                  push ebp
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add dword ptr [eax], eax
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  call 00007F88A7F07B44h
                  imul esi, dword ptr [edx+63h], 6F766D75h
                  insb
                  jne 00007F8844ED8036h
                  add byte ptr [eax], cl
                  inc ecx
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add bh, bh
                  int3
                  xor dword ptr [eax], eax
                  add eax, 671CB2E9h
                  cmpsb
                  xchg dword ptr [ebx], edx
                  dec ebx
                  stosd
                  popfd
                  push esi
                  out dx, al
                  push ebx
                  movsd
                  jmp 00007F87E69A3C8Eh
                  shl ebx, 1
                  inc eax
                  dec eax
                  xchg eax, esi
                  pop eax
                  push ss
                  jmp far 4F3Ah : 9B80EEF1h
                  lodsd
                  xor ebx, dword ptr [ecx-48EE309Ah]
                  or al, 00h
                  stosb
                  add byte ptr [eax-2Dh], ah
                  xchg eax, ebx
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add dword ptr [eax], eax
                  add byte ptr [eax+00h], cl
                  add byte ptr [eax], al
                  add byte ptr [eax], cl
                  add byte ptr [esi+75h], cl
                  popad
                  outsb
                  arpl word ptr [ebp+72h], sp
                  jnc 00007F8844ED7FC2h
                  or eax, 47000901h
                  outsd
                  outsb
                  outsd
                  jc 00007F8844ED802Bh

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xaf140x28.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x9d8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ac.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xa5280xb000False0.537863991477data6.38736816411IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .data0xc0000x11b40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0xe0000x9d80x1000False0.1806640625data2.12896103936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_ICON0xe8a80x130data
                  RT_ICON0xe5c00x2e8data
                  RT_ICON0xe4980x128GLS_BINARY_LSB_FIRST
                  RT_GROUP_ICON0xe4680x30data
                  RT_VERSION0xe1500x318dataEnglishUnited States

                  Imports

                  DLLImport
                  MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaHresultCheck, __vbaAryMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaI2Str, __vbaFPException, __vbaStrVarVal, __vbaDateVar, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaVar2Vec, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaLateMemCall, __vbaInStrB, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

                  Version Infos

                  DescriptionData
                  Translation0x0409 0x04b0
                  LegalCopyrightCollutions
                  InternalNameDimmock5
                  FileVersion1.00
                  CompanyNameCollutions
                  LegalTrademarksCollutions
                  CommentsCollutions
                  ProductNameCollutions
                  ProductVersion1.00
                  FileDescriptionCreepy Collutions
                  OriginalFilenameDimmock5.exe

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Apr 3, 2021 21:28:57.063009024 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.104257107 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.104377985 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.104971886 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.148574114 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.162067890 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.162125111 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.162149906 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.162163973 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.162199974 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.162213087 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.162225008 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.162273884 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.178500891 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.219722986 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.220861912 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.221852064 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.267597914 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.623802900 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.623862982 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.623898029 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.623936892 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.623975992 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.624003887 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.624044895 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.624052048 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.624057055 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.626981974 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.627096891 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.627722979 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.627768993 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.627799988 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.627825975 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.630914927 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.630968094 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.631012917 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.631051064 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.633925915 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.633970022 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.634013891 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.634205103 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.636962891 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.637058020 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.638370991 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.638412952 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.638499022 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.638520956 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.667357922 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.667468071 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.667634964 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.668855906 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.668895006 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.669025898 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.669043064 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.671967983 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.672013044 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.672055960 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.672091961 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.674973011 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.675021887 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.675065041 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.675108910 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.678006887 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.678050041 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.678093910 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.678137064 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.681075096 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.681117058 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.681170940 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.681217909 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.684149027 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.684191942 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.684227943 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.684251070 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.687216043 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.687258959 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.687311888 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.687336922 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.690288067 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.690329075 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.690386057 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.690412998 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.693048000 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.693090916 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.693126917 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.693152905 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.695774078 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.695825100 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.695856094 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.695909023 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.698532104 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.698606014 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.698622942 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.698710918 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.701239109 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.701280117 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.701330900 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.701368093 CEST49741443192.168.2.3172.217.23.33
                  Apr 3, 2021 21:28:57.704010010 CEST44349741172.217.23.33192.168.2.3
                  Apr 3, 2021 21:28:57.704060078 CEST44349741172.217.23.33192.168.2.3

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Apr 3, 2021 21:26:52.658694029 CEST53512818.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:52.788124084 CEST4919953192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:52.850121021 CEST53491998.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:52.898739100 CEST5062053192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:52.953587055 CEST53506208.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:53.630685091 CEST6493853192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:53.682168007 CEST53649388.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:54.569523096 CEST6015253192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:54.615592957 CEST53601528.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:55.393383980 CEST5754453192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:55.447717905 CEST53575448.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:56.192456961 CEST5598453192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:56.241266012 CEST53559848.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:57.439815998 CEST6418553192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:57.489022970 CEST53641858.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:58.349874973 CEST6511053192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:58.409580946 CEST53651108.8.8.8192.168.2.3
                  Apr 3, 2021 21:26:59.526803017 CEST5836153192.168.2.38.8.8.8
                  Apr 3, 2021 21:26:59.581473112 CEST53583618.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:00.619247913 CEST6349253192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:00.667506933 CEST53634928.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:01.702913046 CEST6083153192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:01.753806114 CEST53608318.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:02.654890060 CEST6010053192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:02.702331066 CEST53601008.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:03.492252111 CEST5319553192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:03.552632093 CEST53531958.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:04.467761040 CEST5014153192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:04.525242090 CEST53501418.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:05.409342051 CEST5302353192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:05.458154917 CEST53530238.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:06.331608057 CEST4956353192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:06.379941940 CEST53495638.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:07.264858961 CEST5135253192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:07.313739061 CEST53513528.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:08.121592999 CEST5934953192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:08.177475929 CEST53593498.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:09.064527988 CEST5708453192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:09.112958908 CEST53570848.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:10.016024113 CEST5882353192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:10.068330050 CEST53588238.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:29.675410032 CEST5756853192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:29.734827042 CEST53575688.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:52.581410885 CEST5054053192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:52.654979944 CEST53505408.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:52.782737970 CEST5436653192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:52.841981888 CEST53543668.8.8.8192.168.2.3
                  Apr 3, 2021 21:27:56.902631044 CEST5303453192.168.2.38.8.8.8
                  Apr 3, 2021 21:27:56.959047079 CEST53530348.8.8.8192.168.2.3
                  Apr 3, 2021 21:28:05.641415119 CEST5776253192.168.2.38.8.8.8
                  Apr 3, 2021 21:28:05.711725950 CEST53577628.8.8.8192.168.2.3
                  Apr 3, 2021 21:28:18.511337042 CEST5543553192.168.2.38.8.8.8
                  Apr 3, 2021 21:28:18.580071926 CEST53554358.8.8.8192.168.2.3
                  Apr 3, 2021 21:28:33.490812063 CEST5071353192.168.2.38.8.8.8
                  Apr 3, 2021 21:28:33.562118053 CEST53507138.8.8.8192.168.2.3
                  Apr 3, 2021 21:28:37.936959982 CEST5613253192.168.2.38.8.8.8
                  Apr 3, 2021 21:28:37.993304968 CEST53561328.8.8.8192.168.2.3
                  Apr 3, 2021 21:28:56.176302910 CEST5898753192.168.2.38.8.8.8
                  Apr 3, 2021 21:28:56.239506006 CEST53589878.8.8.8192.168.2.3
                  Apr 3, 2021 21:28:56.981240034 CEST5657953192.168.2.38.8.8.8
                  Apr 3, 2021 21:28:57.060580015 CEST53565798.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:10.735685110 CEST6063353192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:10.783648968 CEST53606338.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:12.790719032 CEST6129253192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:12.863223076 CEST53612928.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:46.144838095 CEST6361953192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:46.251244068 CEST53636198.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:46.961075068 CEST6493853192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:47.026693106 CEST53649388.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:47.554347038 CEST6194653192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:47.616621971 CEST53619468.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:48.290796041 CEST6491053192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:48.349611998 CEST53649108.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:49.052926064 CEST5212353192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:49.101422071 CEST53521238.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:49.878793955 CEST5613053192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:49.938471079 CEST53561308.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:50.413161993 CEST5633853192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:50.472553015 CEST53563388.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:51.515624046 CEST5942053192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:51.570697069 CEST53594208.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:52.409864902 CEST5878453192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:52.466906071 CEST53587848.8.8.8192.168.2.3
                  Apr 3, 2021 21:29:52.909982920 CEST6397853192.168.2.38.8.8.8
                  Apr 3, 2021 21:29:52.965461969 CEST53639788.8.8.8192.168.2.3
                  Apr 3, 2021 21:30:28.843709946 CEST6293853192.168.2.38.8.8.8
                  Apr 3, 2021 21:30:28.948357105 CEST53629388.8.8.8192.168.2.3

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Apr 3, 2021 21:28:56.981240034 CEST192.168.2.38.8.8.80x8fa2Standard query (0)doc-14-04-docs.googleusercontent.comA (IP address)IN (0x0001)
                  Apr 3, 2021 21:30:28.843709946 CEST192.168.2.38.8.8.80x613aStandard query (0)mail.palacioguevara.comA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Apr 3, 2021 21:27:52.654979944 CEST8.8.8.8192.168.2.30xe744No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                  Apr 3, 2021 21:28:57.060580015 CEST8.8.8.8192.168.2.30x8fa2No error (0)doc-14-04-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                  Apr 3, 2021 21:28:57.060580015 CEST8.8.8.8192.168.2.30x8fa2No error (0)googlehosted.l.googleusercontent.com172.217.23.33A (IP address)IN (0x0001)
                  Apr 3, 2021 21:30:28.948357105 CEST8.8.8.8192.168.2.30x613aNo error (0)mail.palacioguevara.compalacioguevara.comCNAME (Canonical name)IN (0x0001)
                  Apr 3, 2021 21:30:28.948357105 CEST8.8.8.8192.168.2.30x613aNo error (0)palacioguevara.com54.37.255.108A (IP address)IN (0x0001)

                  HTTPS Packets

                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                  Apr 3, 2021 21:28:57.162213087 CEST172.217.23.33443192.168.2.349741CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Mar 16 20:32:57 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Jun 08 21:32:56 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                  CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                  SMTP Packets

                  TimestampSource PortDest PortSource IPDest IPCommands
                  Apr 3, 2021 21:30:29.168144941 CEST5874975454.37.255.108192.168.2.3220-hosting.itecan.es ESMTP Exim 4.94 #2 Sat, 03 Apr 2021 21:30:29 +0200
                  220-We do not authorize the use of this system to transport unsolicited,
                  220 and/or bulk e-mail.
                  Apr 3, 2021 21:30:29.168565035 CEST49754587192.168.2.354.37.255.108EHLO 899552
                  Apr 3, 2021 21:30:29.219896078 CEST5874975454.37.255.108192.168.2.3250-hosting.itecan.es Hello 899552 [84.17.52.79]
                  250-SIZE 52428800
                  250-8BITMIME
                  250-PIPELINING
                  250-X_PIPE_CONNECT
                  250-AUTH PLAIN LOGIN
                  250-STARTTLS
                  250 HELP
                  Apr 3, 2021 21:30:29.221116066 CEST49754587192.168.2.354.37.255.108STARTTLS
                  Apr 3, 2021 21:30:29.275417089 CEST5874975454.37.255.108192.168.2.3220 TLS go ahead

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:21:27:00
                  Start date:03/04/2021
                  Path:C:\Users\user\Desktop\Dimmock5.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Dimmock5.exe'
                  Imagebase:0x400000
                  File size:57344 bytes
                  MD5 hash:1F6C8E6472B60D49704703C99B28A4B8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:Visual Basic
                  Reputation:low

                  General

                  Start time:21:28:47
                  Start date:03/04/2021
                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Dimmock5.exe'
                  Imagebase:0xf80000
                  File size:53248 bytes
                  MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000016.00000002.728202576.0000000001351000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.734840874.000000001E0F1000.00000004.00000001.sdmp, Author: Joe Security
                  Reputation:high

                  General

                  Start time:21:28:47
                  Start date:03/04/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6b2800000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >