Loading ...

Play interactive tourEdit tour

Analysis Report ordine n#U00b0 276.exe

Overview

General Information

Sample Name:ordine n#U00b0 276.exe
Analysis ID:403969
MD5:10f03c95ba280cd5a82146269f89ca9d
SHA1:c24232721d7aefe2c013b9642e0ab7db8007e48a
SHA256:11f63d2fda1055ac66a71cb539c9d5ff66fd79f473e19171fd8f663e2c4979b9
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Startup

  • System is w10x64
  • ordine n#U00b0 276.exe (PID: 6888 cmdline: 'C:\Users\user\Desktop\ordine n#U00b0 276.exe' MD5: 10F03C95BA280CD5A82146269F89CA9D)
    • RegAsm.exe (PID: 1280 cmdline: 'C:\Users\user\Desktop\ordine n#U00b0 276.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 6896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "Bx27nFj5fV0", "URL: ": "http://9OElorZCtFCqdkfzny.net", "To: ": "greendogman@yandex.com", "ByHost: ": "smtp.fil-net.com:587", "Password: ": "jEiJ6rpwhGxFJ", "From: ": "comercial@fil-net.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.772141814.000000000040C000.00000020.00020000.sdmpLokiBot_Dropper_Packed_R11_Feb18Auto-generated rule - file scan copy.pdf.r11Florian Roth
      • 0x1298:$s1: C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB
      00000000.00000000.643378031.000000000040C000.00000020.00020000.sdmpLokiBot_Dropper_Packed_R11_Feb18Auto-generated rule - file scan copy.pdf.r11Florian Roth
      • 0x1298:$s1: C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB
      Process Memory Space: RegAsm.exe PID: 1280JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Click to see the 2 entries

        Sigma Overview

        Networking:

        barindex
        Sigma detected: RegAsm connects to smtp portShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 46.16.61.250, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, Initiated: true, ProcessId: 1280, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49764

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: RegAsm.exe.1280.8.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "Bx27nFj5fV0", "URL: ": "http://9OElorZCtFCqdkfzny.net", "To: ": "greendogman@yandex.com", "ByHost: ": "smtp.fil-net.com:587", "Password: ": "jEiJ6rpwhGxFJ", "From: ": "comercial@fil-net.com"}
        Source: ordine n#U00b0 276.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000008.00000002.1734186092.0000000020A70000.00000002.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: http://9OElorZCtFCqdkfzny.net
        Source: global trafficTCP traffic: 192.168.2.4:49764 -> 46.16.61.250:587
        Source: Joe Sandbox ViewIP Address: 46.16.61.250 46.16.61.250
        Source: Joe Sandbox ViewASN Name: CDMONsistemescdmoncomES CDMONsistemescdmoncomES
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: global trafficTCP traffic: 192.168.2.4:49764 -> 46.16.61.250:587
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3A09A recv,
        Source: unknownDNS traffic detected: queries for: doc-10-9k-docs.googleusercontent.com
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: http://9OElorZCtFCqdkfzny.net
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
        Source: RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
        Source: RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
        Source: RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
        Source: RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://crls.pki.goog/gts1c3/QqFxbi9M48c.crl0
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: http://mGfDbY.com
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr10)
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1c301
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gtsr100
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
        Source: RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0%
        Source: RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
        Source: RegAsm.exe, 00000008.00000003.999355961.00000000013FA000.00000004.00000001.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
        Source: RegAsm.exe, 00000008.00000002.1726751510.0000000001380000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-9k-docs.googleusercontent.com/
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: https://doc-10-9k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/ka3e4p4q
        Source: RegAsm.exe, 00000008.00000002.1726830201.00000000013A4000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/
        Source: RegAsm.exe, 00000008.00000002.1726776559.0000000001388000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1eL1W59FTaS1ZK7NLLis7VKY3s5Fdhau-
        Source: RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpString found in binary or memory: https://pki.goog/repository/0
        Source: RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.4:49745 version: TLS 1.2

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.772141814.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
        Source: 00000000.00000000.643378031.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B954FB NtResumeThread,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3B0BA NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3B089 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040377D
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404647
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404263
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404463
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404A2C
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040483D
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004038C1
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040408E
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403CB3
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404746
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404551
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404365
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403F32
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040493B
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004039C7
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004037CB
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403F94
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403D9F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01600070
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01600F38
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01602C00
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01607718
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01607DC1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01603580
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01605A8F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01607628
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01600006
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3247D
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_20017C48
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_2001E85C
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_20018EF0
        Source: ordine n#U00b0 276.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: ordine n#U00b0 276.exe, 00000000.00000002.772168489.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameOPARBE.exe vs ordine n#U00b0 276.exe
        Source: ordine n#U00b0 276.exeBinary or memory string: OriginalFilenameOPARBE.exe vs ordine n#U00b0 276.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: security.dll
        Source: ordine n#U00b0 276.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 00000000.00000002.772141814.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000000.643378031.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@4/2@3/3
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3AF3E AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3AF07 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\3blxsn2e.5rkJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6896:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeFile created: C:\Users\user\AppData\Local\Temp\~DFD8804A7BDBB85CBA.TMPJump to behavior
        Source: ordine n#U00b0 276.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\ordine n#U00b0 276.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000008.00000002.1734186092.0000000020A70000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        Yara detected GuLoaderShow sources
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORY
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407CDB push es; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040CEF8 push ebp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040855C push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00408565 push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00408565 push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407D6F push edx; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407B2B push ds; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407FCC push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00405BD3 push DD90C9D6h; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00408DD4 push esi; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00405BE4 push DD90C9D6h; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407F8D push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00405D90 push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B908BE push 0000002Bh; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B9088C push 0000002Bh; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B922FA push edx; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B908D7 push 0000002Bh; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B900C5 pushad ; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B9303C push 7446A32Bh; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B91C7F push ebp; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B92A73 push FFFFFFD4h; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B94A77 push edx; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B94A62 push edx; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B92A4C push FFFFFFD4h; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B917D6 push edx; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B9132B push ebp; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02B9470A push ecx; iretd
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_1DB3247D push FFFFFFC3h; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeRDTSC instruction interceptor: First address: 0000000002B923B7 second address: 0000000002B923B7 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FADB0D044E8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp dh, ch 0x0000001f pop ecx 0x00000020 add edi, edx 0x00000022 test ecx, 93E93443h 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007FADB0D044C6h 0x0000002e test cx, 1904h 0x00000033 push ecx 0x00000034 call 00007FADB0D04502h 0x00000039 call 00007FADB0D044F8h 0x0000003e lfence 0x00000041 mov edx, dword ptr [7FFE0014h] 0x00000047 lfence 0x0000004a ret 0x0000004b mov esi, edx 0x0000004d pushad 0x0000004e rdtsc
        Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFunction Chain: memAlloc,memAlloc,systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,memAlloc,threadDelayed,threadDelayed,keyOpened,keyEnumerated,keyEnumerated
        Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Tries to detect Any.runShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: ordine n#U00b0 276.exe, 00000000.00000002.776473131.0000000002BA0000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1726371428.0000000001110000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: ordine n#U00b0 276.exe, 00000000.00000002.776473131.0000000002BA0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
        Source: RegAsm.exe, 00000008.00000002.1726371428.0000000001110000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
        Tries to detect virtualization through RDTSC time measurementsShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeRDTSC instruction interceptor: First address: 0000000002B923B7 second address: 0000000002B923B7 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FADB0D044E8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp dh, ch 0x0000001f pop ecx 0x00000020 add edi, edx 0x00000022 test ecx, 93E93443h 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007FADB0D044C6h 0x0000002e test cx, 1904h 0x00000033 push ecx 0x00000034 call 00007FADB0D04502h 0x00000039 call 00007FADB0D044F8h 0x0000003e lfence 0x00000041 mov edx, dword ptr [7FFE0014h] 0x00000047 lfence 0x0000004a ret 0x0000004b mov esi, edx 0x0000004d pushad 0x0000004e rdtsc
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeRDTSC instruction interceptor: First address: 0000000002B92528 second address: 0000000002B92528 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FADB08004F0h 0x0000001d popad 0x0000001e call 00007FADB07FE2EAh 0x00000023 lfence 0x00000026 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FB2528 second address: 0000000000FB2528 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FADB0D06700h 0x0000001d popad 0x0000001e call 00007FADB0D044FAh 0x00000023 lfence 0x00000026 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 2874
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -86220000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -90000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -39718s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -40406s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -39594s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -59562s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -39468s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -59468s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3484Thread sleep time: -30000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
        Source: RegAsm.exe, 00000008.00000002.1733290037.0000000020310000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: RegAsm.exe, 00000008.00000002.1726912916.00000000013E1000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: RegAsm.exe, 00000008.00000002.1733290037.0000000020310000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegAsm.exe, 00000008.00000002.1726912916.00000000013E1000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW,
        Source: ordine n#U00b0 276.exe, 00000000.00000002.776473131.0000000002BA0000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1726371428.0000000001110000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: RegAsm.exe, 00000008.00000002.1733290037.0000000020310000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: RegAsm.exe, 00000008.00000002.1726371428.0000000001110000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeMsi.dllPublishershell32advapi32USERPROFILE=wininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        Source: ordine n#U00b0 276.exe, 00000000.00000002.776473131.0000000002BA0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
        Source: RegAsm.exe, 00000008.00000002.1733290037.0000000020310000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 8_2_01602888 LdrInitializeThunk,
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040377D mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004038C1 mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004039C7 mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004037CB mov ebx, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: FB0000
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: RegAsm.exe, 00000008.00000002.1727345684.00000000019E0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: RegAsm.exe, 00000008.00000002.1727345684.00000000019E0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegAsm.exe, 00000008.00000002.1727345684.00000000019E0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegAsm.exe, 00000008.00000002.1727345684.00000000019E0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORY
        Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
        Tries to harvest and steal browser information (history, passwords, etc)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
        Tries to harvest and steal ftp login credentialsShow sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
        Tries to steal Mail credentials (via file access)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: Yara matchFile source: 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORY

        Remote Access Functionality:

        barindex
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools11OS Credential Dumping2System Information Discovery314Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsNative API1Boot or Logon Initialization ScriptsAccess Token Manipulation1Obfuscated Files or Information1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112DLL Side-Loading1Security Account ManagerSecurity Software Discovery621SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion341LSA SecretsVirtualization/Sandbox Evasion341SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol112Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        ordine n#U00b0 276.exe9%ReversingLabsWin32.Worm.Wbvb

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        smtp.fil-net.com0%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://crl.pki.goog/gsr1/gsr1.crl0;0%Avira URL Cloudsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        http://9OElorZCtFCqdkfzny.net0%Avira URL Cloudsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        http://crl.pki.goog/gtsr1/gtsr1.crl0W0%Avira URL Cloudsafe
        http://pki.goog/gsr1/gsr1.crt020%Avira URL Cloudsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        http://crls.pki.goog/gts1c3/QqFxbi9M48c.crl00%Avira URL Cloudsafe
        https://api.ipify.org%0%URL Reputationsafe
        https://api.ipify.org%0%URL Reputationsafe
        https://api.ipify.org%0%URL Reputationsafe
        http://mGfDbY.com0%Avira URL Cloudsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://r3.i.lencr.org/0%0%Avira URL Cloudsafe
        http://pki.goog/repo/certs/gts1c3.der00%Avira URL Cloudsafe
        http://pki.goog/repo/certs/gtsr1.der040%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        smtp.fil-net.com
        46.16.61.250
        truetrueunknown
        googlehosted.l.googleusercontent.com
        216.58.212.129
        truefalse
          high
          doc-10-9k-docs.googleusercontent.com
          unknown
          unknownfalse
            high

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://9OElorZCtFCqdkfzny.nettrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://DynDns.comDynDNSRegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crl.pki.goog/gsr1/gsr1.crl0;RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://cps.letsencrypt.org0RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://r3.o.lencr.org0RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://doc-10-9k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/ka3e4p4qRegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
              high
              https://api.ipify.org%GETMozilla/5.0RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              low
              http://crl.pki.goog/gtsr1/gtsr1.crl0WRegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://pki.goog/gsr1/gsr1.crt02RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://pki.goog/repository/0RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://crls.pki.goog/gts1c3/QqFxbi9M48c.crl0RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://doc-10-9k-docs.googleusercontent.com/RegAsm.exe, 00000008.00000002.1726751510.0000000001380000.00000004.00000020.sdmpfalse
                high
                https://api.ipify.org%RegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                low
                http://mGfDbY.comRegAsm.exe, 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://cps.root-x1.letsencrypt.org0RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://r3.i.lencr.org/0%RegAsm.exe, 00000008.00000002.1732276506.000000001FF5D000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://pki.goog/repo/certs/gts1c3.der0RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://pki.goog/repo/certs/gtsr1.der04RegAsm.exe, 00000008.00000003.999365877.0000000001401000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                216.58.212.129
                googlehosted.l.googleusercontent.comUnited States
                15169GOOGLEUSfalse
                46.16.61.250
                smtp.fil-net.comSpain
                197712CDMONsistemescdmoncomEStrue

                Private

                IP
                192.168.2.1

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:403969
                Start date:04.05.2021
                Start time:15:32:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 13m 41s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:ordine n#U00b0 276.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:32
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.spre.troj.spyw.evad.winEXE@4/2@3/3
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 15% (good quality ratio 7.6%)
                • Quality average: 33.4%
                • Quality standard deviation: 36.5%
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Excluded IPs from analysis (whitelisted): 104.43.193.48, 52.255.188.83, 92.122.145.220, 20.82.210.154, 92.122.213.247, 92.122.213.194, 2.20.142.209, 2.20.142.210, 142.250.185.78, 52.155.217.156, 20.54.26.129, 20.190.159.135, 20.190.159.137, 20.190.159.133, 40.126.31.9, 40.126.31.7, 40.126.31.136, 40.126.31.3, 40.126.31.142, 51.11.168.232, 40.127.240.158, 51.104.136.2
                • TCP Packets have been reduced to 100
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, www.tm.a.prd.aadg.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, login.live.com, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, a767.dscg3.akamai.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                15:33:51API Interceptor3896x Sleep call for process: RegAsm.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                46.16.61.250a5FVSNazgr.exeGet hashmaliciousBrowse
                  HdgnMEvcFK.exeGet hashmaliciousBrowse
                    RTStyEQJpZ.exeGet hashmaliciousBrowse
                      PAGO.xlsxGet hashmaliciousBrowse
                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                          Zapytanie -20216470859302.exeGet hashmaliciousBrowse
                            winlog.exeGet hashmaliciousBrowse
                              PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                Nakit Akisi Detaylariniz.exeGet hashmaliciousBrowse
                                  S67xSX1MNR.exeGet hashmaliciousBrowse

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    smtp.fil-net.comZapytanie -20216470859302.exeGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    Nakit Akisi Detaylariniz.exeGet hashmaliciousBrowse
                                    • 46.16.61.250

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    CDMONsistemescdmoncomESa5FVSNazgr.exeGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    HdgnMEvcFK.exeGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    RTStyEQJpZ.exeGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    PAGO.xlsxGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    Zapytanie -20216470859302.exeGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    njGJ1eW44wshoMr.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    3nG9LW7Z21dxUoM.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    keeFDE9dhCGNNez.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    74tF1foMeQyUMCh.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    qm7JU84PFgfqvgs.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    winlog.exeGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                    • 46.16.61.250
                                    WbGKi8E5OE4eCFG.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    r9SWnqQlK8PFPEp.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    L9oOm9x3I7YZFcA.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    SecuriteInfo.com.Trojan.DownLoader36.34557.26355.exeGet hashmaliciousBrowse
                                    • 134.0.10.35
                                    jKiL1mzTAVltJ30.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    09xcuRN2HJmRRCm.exeGet hashmaliciousBrowse
                                    • 46.16.62.134
                                    57229937-122020-4-7676523.docGet hashmaliciousBrowse
                                    • 185.66.41.128

                                    JA3 Fingerprints

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    37f463bf4616ecd445d4a1937da06e19statistic-2067311372.xlsmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    statistic-2069354685.xlsmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    statistic-2070252624.xlsmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    statistic-2072807337.xlsmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    statistic-207394368.xlsmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    f97e137e_by_Libranalysis.exeGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    e1df57de_by_Libranalysis.xlsGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    MV RED SEA.docxGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    MyUY1HeWNL.exeGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    IMG-WA7905432.exeGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    catalog-1521295750.xlsmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    Documents_111651917_375818984.xlsGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    Remittance Advice pdf.exeGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    #U260e#Ufe0fAUDIO-2020-05-26-18-51-m4a_MP4messages_2202-434.htmGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    Documents_95326461_1831689059.xlsGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    Tree Top.htmlGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    PT6-1152.docGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    s.dllGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    setup-lightshot.exeGet hashmaliciousBrowse
                                    • 216.58.212.129
                                    s.dllGet hashmaliciousBrowse
                                    • 216.58.212.129

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Users\user\AppData\Roaming\3blxsn2e.5rk\Chrome\Default\Cookies
                                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                    Category:modified
                                    Size (bytes):20480
                                    Entropy (8bit):0.7006690334145785
                                    Encrypted:false
                                    SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                    MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                    SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                    SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                    SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    \Device\ConDrv
                                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):30
                                    Entropy (8bit):3.964735178725505
                                    Encrypted:false
                                    SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                    MD5:9F754B47B351EF0FC32527B541420595
                                    SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                    SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                    SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: NordVPN directory not found!..

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):4.764868199016906
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.15%
                                    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:ordine n#U00b0 276.exe
                                    File size:98304
                                    MD5:10f03c95ba280cd5a82146269f89ca9d
                                    SHA1:c24232721d7aefe2c013b9642e0ab7db8007e48a
                                    SHA256:11f63d2fda1055ac66a71cb539c9d5ff66fd79f473e19171fd8f663e2c4979b9
                                    SHA512:4b537aec0eee96b506ac63fcbdffc4e1e2ac231ca8d5136cfe7a67e84ac5643424d7090ae88ddb3e809d94272fa15edb20ed70964076fbf05260dceabac5ab76
                                    SSDEEP:1536:kh70hrnoEdQNvX1/o3IAEmYY6qbtug0Oj1o/:kl0tnoO81/4OYZJGO5S
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L.....UQ.................P... ......|........`....@................

                                    File Icon

                                    Icon Hash:b074cecec891b2e4

                                    Static PE Info

                                    General

                                    Entrypoint:0x40157c
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                    DLL Characteristics:
                                    Time Stamp:0x51551DDA [Fri Mar 29 04:51:38 2013 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:631ffe9ad0b821781f48149fabda62f6

                                    Entrypoint Preview

                                    Instruction
                                    push 0040CC14h
                                    call 00007FADB0C84B55h
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    xor byte ptr [eax], al
                                    add byte ptr [eax], al
                                    inc eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [esp], bl
                                    or eax, CA69BFC2h
                                    inc edi
                                    lodsb
                                    jmp far 22F3h : 4FE1EAFFh
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    or eax, 270A0D0Ah
                                    dec ebp
                                    push ebp
                                    dec esi
                                    push edx
                                    inc ebp
                                    push ecx
                                    push ebp
                                    dec ecx
                                    push esp
                                    add byte ptr [0A0D200Ah], cl
                                    or eax, 0000000Ah
                                    add bh, bh
                                    int3
                                    xor dword ptr [eax], eax
                                    sub byte ptr [ecx-1Bh], bl
                                    aaa
                                    int3
                                    std
                                    mov dword ptr [F68E487Eh], eax
                                    pop ebx
                                    or eax, AFD57F95h
                                    jl 00007FADB0C84B3Dh
                                    test eax, E711F84Fh
                                    dec edi
                                    pushfd
                                    adc dword ptr [esi+48E65169h], ebx
                                    sub al, 3Ah
                                    dec edi
                                    lodsd
                                    xor ebx, dword ptr [ecx-48EE309Ah]
                                    or al, 00h
                                    stosb
                                    add byte ptr [eax-2Dh], ah
                                    xchg eax, ebx
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    xor eax, 470000B5h
                                    add al, byte ptr [eax]
                                    add byte ptr [eax], al
                                    add al, 00h
                                    insd
                                    popad
                                    jc 00007FADB0C84BCFh
                                    add byte ptr [43000501h], cl
                                    dec edi
                                    push esi
                                    inc ebp
                                    push esp
                                    add byte ptr [ecx], bl
                                    add dword ptr [eax], eax
                                    inc edx

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x150540x28.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x5a4.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x10c.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x144d00x15000False0.33740234375data5.19887366844IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .data0x160000xad40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                    .rsrc0x170000x5a40x1000False0.1826171875data1.71136635862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0x173bc0x1e8data
                                    RT_GROUP_ICON0x173a80x14data
                                    RT_VERSION0x170f00x2b8COM executable for DOSEnglishUnited States

                                    Imports

                                    DLLImport
                                    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                    Version Infos

                                    DescriptionData
                                    Translation0x0409 0x04b0
                                    InternalNameOPARBE
                                    FileVersion1.00
                                    CompanyNameMummys Technology
                                    CommentsMummys Technology
                                    ProductNameMummys Technology
                                    ProductVersion1.00
                                    FileDescriptionMummys Technology
                                    OriginalFilenameOPARBE.exe

                                    Possible Origin

                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States

                                    Network Behavior

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    May 4, 2021 15:33:44.572319031 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.612984896 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.613104105 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.613687992 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.655802011 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.662863970 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.662900925 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.662920952 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.662941933 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.662962914 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.662972927 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.662986040 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.663006067 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.663026094 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.700042963 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.743093014 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.743417025 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.744574070 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.789469957 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.967124939 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.967187881 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.967230082 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.967289925 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.967339039 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.968014956 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.968048096 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.968082905 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.968112946 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.971024990 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.971055984 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.971136093 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.971160889 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.973953009 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.973983049 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.974102974 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.974131107 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.976912975 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.976943016 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.976999044 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.979947090 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.979976892 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.980098009 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.982877970 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.982914925 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.982986927 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.983010054 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:44.985869884 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.985908985 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:44.985985994 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.008136988 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.008222103 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.008260965 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.008327007 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.010838985 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.010931015 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.011029005 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.012511015 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.012556076 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.012586117 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.012609005 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.015357018 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.015404940 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.015465021 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.015489101 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.018477917 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.018521070 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.018738985 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.021447897 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.021478891 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.021548986 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.024266005 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.024286032 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.024363995 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.027165890 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.027188063 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.027245998 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.030052900 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.030071020 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.030354977 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.032716990 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.032752991 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.032851934 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.035206079 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.035238028 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.035271883 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.035298109 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.037623882 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.037648916 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.037714005 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.040081024 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.040105104 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.040188074 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.042586088 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.042644024 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.042689085 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.042738914 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.044986963 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.045033932 CEST44349745216.58.212.129192.168.2.4
                                    May 4, 2021 15:33:45.045141935 CEST49745443192.168.2.4216.58.212.129
                                    May 4, 2021 15:33:45.047472000 CEST44349745216.58.212.129192.168.2.4

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    May 4, 2021 15:32:40.045464993 CEST5453153192.168.2.48.8.8.8
                                    May 4, 2021 15:32:40.094208956 CEST53545318.8.8.8192.168.2.4
                                    May 4, 2021 15:32:40.954361916 CEST4971453192.168.2.48.8.8.8
                                    May 4, 2021 15:32:41.003158092 CEST53497148.8.8.8192.168.2.4
                                    May 4, 2021 15:32:41.736464977 CEST5802853192.168.2.48.8.8.8
                                    May 4, 2021 15:32:41.785149097 CEST53580288.8.8.8192.168.2.4
                                    May 4, 2021 15:32:42.659574986 CEST5309753192.168.2.48.8.8.8
                                    May 4, 2021 15:32:42.708424091 CEST53530978.8.8.8192.168.2.4
                                    May 4, 2021 15:32:42.896543026 CEST4925753192.168.2.48.8.8.8
                                    May 4, 2021 15:32:42.963821888 CEST53492578.8.8.8192.168.2.4
                                    May 4, 2021 15:32:43.541533947 CEST6238953192.168.2.48.8.8.8
                                    May 4, 2021 15:32:43.592067003 CEST53623898.8.8.8192.168.2.4
                                    May 4, 2021 15:32:44.592176914 CEST4991053192.168.2.48.8.8.8
                                    May 4, 2021 15:32:44.646218061 CEST53499108.8.8.8192.168.2.4
                                    May 4, 2021 15:32:46.039527893 CEST5585453192.168.2.48.8.8.8
                                    May 4, 2021 15:32:46.108371019 CEST53558548.8.8.8192.168.2.4
                                    May 4, 2021 15:32:47.007075071 CEST6454953192.168.2.48.8.8.8
                                    May 4, 2021 15:32:47.055928946 CEST53645498.8.8.8192.168.2.4
                                    May 4, 2021 15:32:48.739245892 CEST6315353192.168.2.48.8.8.8
                                    May 4, 2021 15:32:48.787933111 CEST53631538.8.8.8192.168.2.4
                                    May 4, 2021 15:32:49.873409986 CEST5299153192.168.2.48.8.8.8
                                    May 4, 2021 15:32:49.925098896 CEST53529918.8.8.8192.168.2.4
                                    May 4, 2021 15:32:50.810866117 CEST5370053192.168.2.48.8.8.8
                                    May 4, 2021 15:32:50.859603882 CEST53537008.8.8.8192.168.2.4
                                    May 4, 2021 15:32:51.947354078 CEST5172653192.168.2.48.8.8.8
                                    May 4, 2021 15:32:52.000696898 CEST53517268.8.8.8192.168.2.4
                                    May 4, 2021 15:32:53.351233959 CEST5679453192.168.2.48.8.8.8
                                    May 4, 2021 15:32:53.400072098 CEST53567948.8.8.8192.168.2.4
                                    May 4, 2021 15:32:54.265948057 CEST5653453192.168.2.48.8.8.8
                                    May 4, 2021 15:32:54.323062897 CEST53565348.8.8.8192.168.2.4
                                    May 4, 2021 15:32:55.132121086 CEST5662753192.168.2.48.8.8.8
                                    May 4, 2021 15:32:55.192071915 CEST53566278.8.8.8192.168.2.4
                                    May 4, 2021 15:32:56.250293016 CEST5662153192.168.2.48.8.8.8
                                    May 4, 2021 15:32:56.299580097 CEST53566218.8.8.8192.168.2.4
                                    May 4, 2021 15:32:57.100306988 CEST6311653192.168.2.48.8.8.8
                                    May 4, 2021 15:32:57.149581909 CEST53631168.8.8.8192.168.2.4
                                    May 4, 2021 15:32:57.967885971 CEST6407853192.168.2.48.8.8.8
                                    May 4, 2021 15:32:58.016633034 CEST53640788.8.8.8192.168.2.4
                                    May 4, 2021 15:33:15.147033930 CEST6480153192.168.2.48.8.8.8
                                    May 4, 2021 15:33:15.197618961 CEST53648018.8.8.8192.168.2.4
                                    May 4, 2021 15:33:29.537322044 CEST6172153192.168.2.48.8.8.8
                                    May 4, 2021 15:33:29.601537943 CEST53617218.8.8.8192.168.2.4
                                    May 4, 2021 15:33:35.353529930 CEST5125553192.168.2.48.8.8.8
                                    May 4, 2021 15:33:35.415411949 CEST53512558.8.8.8192.168.2.4
                                    May 4, 2021 15:33:43.406893015 CEST6152253192.168.2.48.8.8.8
                                    May 4, 2021 15:33:43.474893093 CEST53615228.8.8.8192.168.2.4
                                    May 4, 2021 15:33:44.503277063 CEST5233753192.168.2.48.8.8.8
                                    May 4, 2021 15:33:44.568542004 CEST53523378.8.8.8192.168.2.4
                                    May 4, 2021 15:33:49.157248974 CEST5504653192.168.2.48.8.8.8
                                    May 4, 2021 15:33:49.262083054 CEST53550468.8.8.8192.168.2.4
                                    May 4, 2021 15:33:50.119745970 CEST4961253192.168.2.48.8.8.8
                                    May 4, 2021 15:33:50.446191072 CEST53496128.8.8.8192.168.2.4
                                    May 4, 2021 15:33:51.255096912 CEST4928553192.168.2.48.8.8.8
                                    May 4, 2021 15:33:51.355187893 CEST53492858.8.8.8192.168.2.4
                                    May 4, 2021 15:33:51.914782047 CEST5060153192.168.2.48.8.8.8
                                    May 4, 2021 15:33:51.954771042 CEST6087553192.168.2.48.8.8.8
                                    May 4, 2021 15:33:51.976136923 CEST53506018.8.8.8192.168.2.4
                                    May 4, 2021 15:33:52.023849010 CEST53608758.8.8.8192.168.2.4
                                    May 4, 2021 15:33:52.544280052 CEST5644853192.168.2.48.8.8.8
                                    May 4, 2021 15:33:52.603557110 CEST53564488.8.8.8192.168.2.4
                                    May 4, 2021 15:33:53.198702097 CEST5917253192.168.2.48.8.8.8
                                    May 4, 2021 15:33:53.255937099 CEST53591728.8.8.8192.168.2.4
                                    May 4, 2021 15:33:54.143522978 CEST6242053192.168.2.48.8.8.8
                                    May 4, 2021 15:33:54.203474998 CEST53624208.8.8.8192.168.2.4
                                    May 4, 2021 15:33:54.948461056 CEST6057953192.168.2.48.8.8.8
                                    May 4, 2021 15:33:55.007996082 CEST53605798.8.8.8192.168.2.4
                                    May 4, 2021 15:33:55.889342070 CEST5018353192.168.2.48.8.8.8
                                    May 4, 2021 15:33:55.949563980 CEST53501838.8.8.8192.168.2.4
                                    May 4, 2021 15:33:56.185600996 CEST6153153192.168.2.48.8.8.8
                                    May 4, 2021 15:33:56.245059013 CEST53615318.8.8.8192.168.2.4
                                    May 4, 2021 15:33:56.407876015 CEST4922853192.168.2.48.8.8.8
                                    May 4, 2021 15:33:56.456758022 CEST53492288.8.8.8192.168.2.4
                                    May 4, 2021 15:34:26.118033886 CEST5979453192.168.2.48.8.8.8
                                    May 4, 2021 15:34:26.166835070 CEST53597948.8.8.8192.168.2.4
                                    May 4, 2021 15:34:27.903454065 CEST5591653192.168.2.48.8.8.8
                                    May 4, 2021 15:34:27.969216108 CEST53559168.8.8.8192.168.2.4
                                    May 4, 2021 15:35:13.105088949 CEST5275253192.168.2.48.8.8.8
                                    May 4, 2021 15:35:13.170341015 CEST53527528.8.8.8192.168.2.4
                                    May 4, 2021 15:35:34.531362057 CEST6054253192.168.2.48.8.8.8
                                    May 4, 2021 15:35:34.588290930 CEST53605428.8.8.8192.168.2.4
                                    May 4, 2021 15:37:35.214534998 CEST6068953192.168.2.48.8.8.8
                                    May 4, 2021 15:37:35.275285959 CEST53606898.8.8.8192.168.2.4
                                    May 4, 2021 15:37:35.884021044 CEST6420653192.168.2.48.8.8.8
                                    May 4, 2021 15:37:35.953700066 CEST53642068.8.8.8192.168.2.4
                                    May 4, 2021 15:37:39.018558979 CEST5090453192.168.2.48.8.8.8
                                    May 4, 2021 15:37:39.090518951 CEST53509048.8.8.8192.168.2.4
                                    May 4, 2021 15:37:42.572835922 CEST5752553192.168.2.48.8.8.8
                                    May 4, 2021 15:37:42.646023035 CEST53575258.8.8.8192.168.2.4
                                    May 4, 2021 15:37:43.007853031 CEST5381453192.168.2.48.8.8.8
                                    May 4, 2021 15:37:43.064872026 CEST53538148.8.8.8192.168.2.4
                                    May 4, 2021 15:39:58.554929018 CEST5341853192.168.2.48.8.8.8
                                    May 4, 2021 15:39:58.617453098 CEST53534188.8.8.8192.168.2.4

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    May 4, 2021 15:33:44.503277063 CEST192.168.2.48.8.8.80xfb42Standard query (0)doc-10-9k-docs.googleusercontent.comA (IP address)IN (0x0001)
                                    May 4, 2021 15:35:13.105088949 CEST192.168.2.48.8.8.80x881dStandard query (0)smtp.fil-net.comA (IP address)IN (0x0001)
                                    May 4, 2021 15:35:34.531362057 CEST192.168.2.48.8.8.80x53ebStandard query (0)smtp.fil-net.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    May 4, 2021 15:33:44.568542004 CEST8.8.8.8192.168.2.40xfb42No error (0)doc-10-9k-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                                    May 4, 2021 15:33:44.568542004 CEST8.8.8.8192.168.2.40xfb42No error (0)googlehosted.l.googleusercontent.com216.58.212.129A (IP address)IN (0x0001)
                                    May 4, 2021 15:35:13.170341015 CEST8.8.8.8192.168.2.40x881dNo error (0)smtp.fil-net.com46.16.61.250A (IP address)IN (0x0001)
                                    May 4, 2021 15:35:34.588290930 CEST8.8.8.8192.168.2.40x53ebNo error (0)smtp.fil-net.com46.16.61.250A (IP address)IN (0x0001)
                                    May 4, 2021 15:37:35.275285959 CEST8.8.8.8192.168.2.40xf915No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                                    HTTPS Packets

                                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                    May 4, 2021 15:33:44.662986040 CEST216.58.212.129443192.168.2.449745CN=*.googleusercontent.com CN=GTS CA 1C3, O=Google Trust Services LLC, C=US CN=GTS Root R1, O=Google Trust Services LLC, C=USCN=GTS CA 1C3, O=Google Trust Services LLC, C=US CN=GTS Root R1, O=Google Trust Services LLC, C=US CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BETue Apr 13 12:41:17 CEST 2021 Thu Aug 13 02:00:42 CEST 2020 Fri Jun 19 02:00:42 CEST 2020Tue Jul 06 12:41:16 CEST 2021 Thu Sep 30 02:00:42 CEST 2027 Fri Jan 28 01:00:42 CET 2028771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                    CN=GTS CA 1C3, O=Google Trust Services LLC, C=USCN=GTS Root R1, O=Google Trust Services LLC, C=USThu Aug 13 02:00:42 CEST 2020Thu Sep 30 02:00:42 CEST 2027
                                    CN=GTS Root R1, O=Google Trust Services LLC, C=USCN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BEFri Jun 19 02:00:42 CEST 2020Fri Jan 28 01:00:42 CET 2028

                                    SMTP Packets

                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    May 4, 2021 15:35:43.815591097 CEST5874976546.16.61.250192.168.2.4220 vxsys-smtpclusterma-06.srv.cat ESMTP
                                    May 4, 2021 15:35:43.816262960 CEST49765587192.168.2.446.16.61.250EHLO 468325
                                    May 4, 2021 15:35:43.879950047 CEST5874976546.16.61.250192.168.2.4250-vxsys-smtpclusterma-06.srv.cat
                                    250-PIPELINING
                                    250-SIZE 47185920
                                    250-ETRN
                                    250-STARTTLS
                                    250-AUTH LOGIN PLAIN CRAM-MD5 DIGEST-MD5
                                    250-ENHANCEDSTATUSCODES
                                    250-8BITMIME
                                    250-DSN
                                    250 CHUNKING
                                    May 4, 2021 15:35:43.880307913 CEST49765587192.168.2.446.16.61.250STARTTLS
                                    May 4, 2021 15:35:43.941596031 CEST5874976546.16.61.250192.168.2.4220 2.0.0 Ready to start TLS

                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:15:32:46
                                    Start date:04/05/2021
                                    Path:C:\Users\user\Desktop\ordine n#U00b0 276.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
                                    Imagebase:0x400000
                                    File size:98304 bytes
                                    MD5 hash:10F03C95BA280CD5A82146269F89CA9D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Visual Basic
                                    Yara matches:
                                    • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000002.772141814.000000000040C000.00000020.00020000.sdmp, Author: Florian Roth
                                    • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000000.643378031.000000000040C000.00000020.00020000.sdmp, Author: Florian Roth
                                    Reputation:low

                                    General

                                    Start time:15:33:17
                                    Start date:04/05/2021
                                    Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
                                    Imagebase:0xbe0000
                                    File size:53248 bytes
                                    MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1731275850.000000001DD01000.00000004.00000001.sdmp, Author: Joe Security
                                    Reputation:high

                                    General

                                    Start time:15:33:18
                                    Start date:04/05/2021
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff724c50000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Disassembly

                                    Code Analysis

                                    Reset < >