Loading ...

Play interactive tourEdit tour

Windows Analysis Report RpDMpvgd55

Overview

General Information

Sample Name:RpDMpvgd55 (renamed file extension from none to exe)
Analysis ID:478945
MD5:0e569851a5caffd0924437714db46abe
SHA1:32fe45fbef9753d08978ad11a0001b29f032ba34
SHA256:8fd4b32e8bc096e4f4c34ba302295caa4accd453edff3e4a153397710fbc4a94
Tags:exeHawkEye
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MailPassView
Multi AV Scanner detection for submitted file
Yara detected HawkEye Keylogger
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Detected HawkEye Rat
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Writes to foreign memory regions
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Yara detected WebBrowserPassView password recovery tool
PE file has nameless sections
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to steal Instant Messenger accounts or passwords
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Contains capabilities to detect virtual machines
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • RpDMpvgd55.exe (PID: 6900 cmdline: 'C:\Users\user\Desktop\RpDMpvgd55.exe' MD5: 0E569851A5CAFFD0924437714DB46ABE)
    • cmd.exe (PID: 7156 cmdline: 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\RpDMpvgd55.exe' 'C:\Users\user\AppData\Local\start.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 2896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • explorer.exe (PID: 5632 cmdline: 'C:\Windows\System32\explorer.exe' /c, 'C:\Users\user\AppData\Local\start.exe' MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
  • explorer.exe (PID: 6380 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • start.exe (PID: 6344 cmdline: 'C:\Users\user\AppData\Local\start.exe' MD5: 0E569851A5CAFFD0924437714DB46ABE)
      • start.exe (PID: 1724 cmdline: C:\Users\user\AppData\Local\start.exe MD5: 0E569851A5CAFFD0924437714DB46ABE)
        • vbc.exe (PID: 7032 cmdline: 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp8598.tmp' MD5: C63ED21D5706A527419C9FBD730FFB2E)
        • vbc.exe (PID: 1768 cmdline: 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp7DB4.tmp' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • start.exe (PID: 3940 cmdline: 'C:\Users\user\AppData\Local\start.exe' -boot MD5: 0E569851A5CAFFD0924437714DB46ABE)
    • start.exe (PID: 4928 cmdline: C:\Users\user\AppData\Local\start.exe MD5: 0E569851A5CAFFD0924437714DB46ABE)
      • vbc.exe (PID: 6728 cmdline: 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpD4F0.tmp' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • start.exe (PID: 6988 cmdline: 'C:\Users\user\AppData\Local\start.exe' -boot MD5: 0E569851A5CAFFD0924437714DB46ABE)
    • start.exe (PID: 6428 cmdline: C:\Users\user\AppData\Local\start.exe MD5: 0E569851A5CAFFD0924437714DB46ABE)
      • vbc.exe (PID: 2232 cmdline: 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpFEB0.tmp' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
    00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
      00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmpMAL_HawkEye_Keylogger_Gen_Dec18Detects HawkEye Keylogger RebornFlorian Roth
      • 0x878fa:$s1: HawkEye Keylogger
      • 0x87963:$s1: HawkEye Keylogger
      • 0x80d3d:$s2: _ScreenshotLogger
      • 0x80d0a:$s3: _PasswordStealer
      00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
        0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmpMAL_HawkEye_Keylogger_Gen_Dec18Detects HawkEye Keylogger RebornFlorian Roth
        • 0x78ab9:$s2: _ScreenshotLogger
        • 0x79005:$s2: _ScreenshotLogger
        • 0x78a86:$s3: _PasswordStealer
        • 0x78fd2:$s3: _PasswordStealer
        Click to see the 71 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        19.3.start.exe.3d75810.2.unpackAPT_NK_BabyShark_KimJoingRAT_Apr19_1Detects BabyShark KimJongRATFlorian Roth
        • 0x696fa:$a1: logins.json
        • 0x6965a:$s3: SELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_login
        • 0x69e7e:$s4: \mozsqlite3.dll
        • 0x686ee:$s5: SMTP Password
        19.3.start.exe.3d75810.2.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          19.3.start.exe.3d75810.2.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            13.2.start.exe.4bc23e0.4.unpackMAL_HawkEye_Keylogger_Gen_Dec18Detects HawkEye Keylogger RebornFlorian Roth
            • 0x85cfa:$s1: HawkEye Keylogger
            • 0x85d63:$s1: HawkEye Keylogger
            • 0x7f13d:$s2: _ScreenshotLogger
            • 0x7f10a:$s3: _PasswordStealer
            13.2.start.exe.4bc23e0.4.unpackSUSP_NET_NAME_ConfuserExDetects ConfuserEx packed fileArnim Rupp
            • 0x856cd:$name: ConfuserEx
            • 0x843da:$compile: AssemblyTitle
            Click to see the 215 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: RpDMpvgd55.exeReversingLabs: Detection: 72%
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: RpDMpvgd55.exeAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\start.exeAvira: detection malicious, Label: HEUR/AGEN.1101677
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\start.exeReversingLabs: Detection: 72%
            Machine Learning detection for sampleShow sources
            Source: RpDMpvgd55.exeJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\start.exeJoe Sandbox ML: detected
            Source: 11.2.start.exe.730000.1.unpackAvira: Label: TR/Dropper.Gen
            Source: 23.2.start.exe.520000.1.unpackAvira: Label: TR/Dropper.Gen
            Source: 1.2.RpDMpvgd55.exe.c30000.0.unpackAvira: Label: TR/Crypt.XDR.Gen
            Source: 19.2.start.exe.500000.1.unpackAvira: Label: TR/Dropper.Gen
            Source: 13.2.start.exe.8c0000.0.unpackAvira: Label: TR/Crypt.XDR.Gen
            Source: 9.2.start.exe.e50000.0.unpackAvira: Label: TR/Crypt.XDR.Gen
            Source: 17.2.start.exe.b40000.0.unpackAvira: Label: TR/Crypt.XDR.Gen
            Source: RpDMpvgd55.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: RpDMpvgd55.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmp
            Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: start.exe, 0000000B.00000002.617396677.0000000003735000.00000004.00000001.sdmp, start.exe, 00000013.00000003.473129874.0000000003D75000.00000004.00000001.sdmp, start.exe, 00000017.00000003.490802427.0000000003F25000.00000004.00000001.sdmp, vbc.exe, 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\
            Source: vbc.exe, 00000019.00000002.491710591.0000000002150000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000002.511848091.0000000002260000.00000004.00000001.sdmpString found in binary or memory: ?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=ab104b93-3a7d-4cc3-b5fe-9fa9f0462c64&partnerId=retailstore2https://login.live.com/me.srfhttp://cookies.onetrust.mgr.consensu.org/?name=euconsent&value=&expire=0&isFirstRequest=truehttp://cookies.onetrust.mgr.consensu.org/https://www.microsoft.com/en-us/welcomeie11/welcomeie11https://www.microsoft.com/store/buy/cartcounthttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: vbc.exe, 00000019.00000002.491710591.0000000002150000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000002.511848091.0000000002260000.00000004.00000001.sdmpString found in binary or memory: ?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/me.srf?wa=wsignin1.0&wreply=https%3A%2F%2Fwww.microsoft.com&uaid=ab104b93-3a7d-4cc3-b5fe-9fa9f0462c64&partnerId=retailstore2https://login.live.com/me.srfhttp://cookies.onetrust.mgr.consensu.org/?name=euconsent&value=&expire=0&isFirstRequest=truehttp://cookies.onetrust.mgr.consensu.org/https://www.microsoft.com/en-us/welcomeie11/welcomeie11https://www.microsoft.com/store/buy/cartcounthttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: vbc.exe, 00000019.00000003.489814645.000000000214C000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000019.00000003.489814645.000000000214C000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000012.00000003.449956890.00000000020F5000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000012.00000003.449956890.00000000020F5000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000012.00000003.449693652.00000000020F4000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000012.00000003.449693652.00000000020F4000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000019.00000003.489646915.000000000214E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 00000019.00000003.489646915.000000000214E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.c
            Source: start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpString found in binary or memory: http://bot.whatismyipaddress.com/
            Source: vbc.exe, 00000012.00000003.447596729.00000000020E1000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.487201383.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.509693008.0000000002241000.00000004.00000001.sdmpString found in binary or memory: http://cookies.onetrust.mgr.consensu.org/?name=euconsent&value=&expire=0&isFirstRequest=true
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpString found in binary or memory: http://pomf.cat/upload.php
            Source: RpDMpvgd55.exe, 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, start.exe, 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, start.exe, 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, start.exe, 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, start.exe, 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, start.exe, 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, start.exe, 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmpString found in binary or memory: http://pomf.cat/upload.php&https://a.pomf.cat/
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpString found in binary or memory: http://pomf.cat/upload.phpCContent-Disposition:
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehp
            Source: vbc.exe, 00000012.00000003.446575309.00000000020F3000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehphttp://www.msn.com/?
            Source: vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.co
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/de-ch/?ocid=iehp
            Source: vbc.exe, 00000012.00000002.450712436.000000000019C000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.490898947.000000000019C000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000002.511307967.000000000019C000.00000004.00000001.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: vbc.exe, 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: vbc.exe, 00000012.00000003.447412207.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.449461802.00000000020E1000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;g
            Source: vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000002.511848091.0000000002260000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629
            Source: vbc.exe, 00000012.00000003.446879234.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpString found in binary or memory: https://a.pomf.cat/
            Source: vbc.exe, 00000012.00000003.446910816.00000000020F4000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gt
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=
            Source: vbc.exe, 00000012.00000003.446410926.00000000020F3000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php
            Source: vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
            Source: vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508440923.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
            Source: vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508440923.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
            Source: vbc.exe, 00000012.00000003.447122027.00000000026D1000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
            Source: vbc.exe, 00000012.00000003.446478560.00000000020FB000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.phpcid=8CU157172&crid=722878611&size=306x271&https=1id=77%2C18
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: vbc.exe, 00000012.00000003.446964985.00000000020E1000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486936386.0000000002131000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: vbc.exe, 00000012.00000003.446184342.00000000020FB000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/
            Source: vbc.exe, 00000012.00000003.446910816.00000000020F4000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446214663.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446385375.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446277904.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446810835.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446355440.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446556696.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446779322.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446613111.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446248806.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446638409.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446434893.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446719432.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.489646915.000000000214E000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486653458.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.489814645.000000000214C000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.488085814.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.487110877.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486793663.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486411159.0000000002143000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508440923.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
            Source: vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
            Source: vbc.exe, 00000012.00000003.446854849.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.488085814.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486588561.0000000002143000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RpDMpvgd55.exe PID: 6900, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6344, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 3940, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTR

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 19.3.start.exe.3d75810.2.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 23.3.start.exe.3f7db5a.2.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.3.start.exe.3fa5810.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 19.3.start.exe.3dcdb5a.0.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.2.start.exe.37d1990.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 33.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.3.start.exe.3ffdb5a.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.3.start.exe.3fa5810.1.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 23.3.start.exe.3f25b55.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.3.start.exe.3fa5b55.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 23.3.start.exe.3f25810.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 33.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.3.start.exe.3ffdb5a.0.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 19.3.start.exe.3d75b55.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 11.2.start.exe.37d1990.3.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 19.3.start.exe.3d75810.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 19.3.start.exe.3dcdb5a.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 23.3.start.exe.3f7db5a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 23.3.start.exe.3f25810.1.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 11.2.start.exe.3735950.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEye v9 Payload Author: ditekshen
            Source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects BabyShark KimJongRAT Author: Florian Roth
            Source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: RpDMpvgd55.exe PID: 6900, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: start.exe PID: 6344, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: start.exe PID: 3940, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: start.exe PID: 6988, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            Source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTRMatched rule: Detects HawkEye Keylogger Reborn Author: Florian Roth
            PE file has nameless sectionsShow sources
            Source: RpDMpvgd55.exeStatic PE information: section name:
            Source: start.exe.4.drStatic PE information: section name:
            Source: RpDMpvgd55.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 19.3.start.exe.3d75810.2.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 23.3.start.exe.3f7db5a.2.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.3.start.exe.3fa5810.1.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 19.3.start.exe.3dcdb5a.0.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.2.start.exe.37d1990.3.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 33.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.3.start.exe.3ffdb5a.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.3.start.exe.3fa5810.1.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 23.3.start.exe.3f25b55.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.3.start.exe.3fa5b55.2.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 23.3.start.exe.3f25810.1.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 33.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.3.start.exe.3ffdb5a.0.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 19.3.start.exe.3d75b55.1.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 11.2.start.exe.37d1990.3.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 19.3.start.exe.3d75810.2.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 19.3.start.exe.3dcdb5a.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 23.3.start.exe.3f7db5a.2.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 23.3.start.exe.3f25810.1.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 11.2.start.exe.3735950.2.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = 2021-01-22, modified = 2021-01-25
            Source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPEMatched rule: HawkEyev9 author = ditekshen, description = HawkEye v9 Payload, cape_type = HawkEyev9 Payload
            Source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1 date = 2019-04-27, hash1 = d50a0980da6297b8e4cec5db0a8773635cee74ac6f5c1ff18197dfba549f6712, author = Florian Roth, description = Detects BabyShark KimJongRAT, reference = https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/
            Source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, type: MEMORYMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: RpDMpvgd55.exe PID: 6900, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: start.exe PID: 6344, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: start.exe PID: 3940, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: start.exe PID: 6988, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTRMatched rule: MAL_HawkEye_Keylogger_Gen_Dec18 date = 2018-12-10, hash1 = b8693e015660d7bd791356b352789b43bf932793457d54beae351cf7a3de4dad, author = Florian Roth, description = Detects HawkEye Keylogger Reborn, reference = https://twitter.com/James_inthe_box/status/1072116224652324870
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeCode function: 1_2_017A20B1
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeCode function: 1_2_017AC8C0
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeCode function: 1_2_017A0A88
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_018820C0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_0188C8B0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_01880A88
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_05799088
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_05790C7F
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_05790C80
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_0579E708
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_05790A10
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_05790A00
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_0BDC87C0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_0BDC87B0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB2068
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB04E0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB54B8
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB38E6
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB9938
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB0C48
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB6C29
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB9F98
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB4178
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB4168
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB05ED
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB05A6
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB8540
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3568
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB0562
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB4519
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB8531
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB4528
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB0527
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB5698
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB48D0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB48E0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB5890
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB5880
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB39D7
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB29F8
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB29E9
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3981
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB9933
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3ADD
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3AAA
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3A77
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3A02
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3BCE
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3BF1
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3B60
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3B1E
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3C73
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3C1D
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB0C35
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3DDD
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3DA0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3D40
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB8E40
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3E75
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB3E1A
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB6E10
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB1F89
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB1F6F
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_05524310
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_055262B8
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_05524C00
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_0552FBD0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_05529090
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_05529080
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_011D20B1
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_011DC8B0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_011D0A88
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_011D61C0
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_02C19088
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_02C10A00
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_02C10A10
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_02C1E708
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_02C10C80
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_02C10C7E
            Source: RpDMpvgd55.exe, 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameReborn Stub.exe" vs RpDMpvgd55.exe
            Source: RpDMpvgd55.exe, 00000001.00000002.366606605.0000000000CF4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamenjh.exeD vs RpDMpvgd55.exe
            Source: RpDMpvgd55.exe, 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamexs.dll4 vs RpDMpvgd55.exe
            Source: RpDMpvgd55.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: start.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: RpDMpvgd55.exeStatic PE information: Section: lUhFD ZLIB complexity 1.00014602804
            Source: start.exe.4.drStatic PE information: Section: lUhFD ZLIB complexity 1.00014602804
            Source: RpDMpvgd55.exeReversingLabs: Detection: 72%
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\RpDMpvgd55.exe 'C:\Users\user\Desktop\RpDMpvgd55.exe'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\RpDMpvgd55.exe' 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\explorer.exe 'C:\Windows\System32\explorer.exe' /c, 'C:\Users\user\AppData\Local\start.exe'
            Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\start.exe 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\start.exe 'C:\Users\user\AppData\Local\start.exe' -boot
            Source: unknownProcess created: C:\Users\user\AppData\Local\start.exe 'C:\Users\user\AppData\Local\start.exe' -boot
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp8598.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpD4F0.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpFEB0.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp7DB4.tmp'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\RpDMpvgd55.exe' 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\explorer.exe 'C:\Windows\System32\explorer.exe' /c, 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\start.exe 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp8598.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp7DB4.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpD4F0.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpFEB0.tmp'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RpDMpvgd55.exe.logJump to behavior
            Source: C:\Users\user\AppData\Local\start.exeFile created: C:\Users\user\AppData\Local\Temp\24b52983-2844-023d-2e9c-886bda31e7b2Jump to behavior
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@25/10@0/0
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: 11.2.start.exe.730000.1.unpack, u200d????????????????????????????????????????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 11.2.start.exe.730000.1.unpack, u200d????????????????????????????????????????.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 11.2.start.exe.730000.1.unpack, u200b????????????????????????????????????????.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 11.2.start.exe.730000.1.unpack, u202a????????????????????????????????????????.csSecurity API names: System.Void Microsoft.Win32.RegistryKey::SetAccessControl(System.Security.AccessControl.RegistrySecurity)
            Source: 11.2.start.exe.730000.1.unpack, u202a????????????????????????????????????????.csSecurity API names: System.Security.Principal.IdentityReference System.Security.Principal.SecurityIdentifier::Translate(System.Type)
            Source: 11.2.start.exe.730000.1.unpack, u202a????????????????????????????????????????.csSecurity API names: System.Void System.Security.AccessControl.RegistrySecurity::AddAccessRule(System.Security.AccessControl.RegistryAccessRule)
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Local\start.exeMutant created: \Sessions\1\BaseNamedObjects\86fd7b63-08aa-4cc7-9ad5-d30444821027
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2896:120:WilError_01
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: unknownProcess created: C:\Windows\explorer.exe
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: 11.2.start.exe.730000.1.unpack, u202d????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.start.exe.730000.1.unpack, u202d????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.start.exe.730000.1.unpack, u202d????????????????????????????????????????.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.start.exe.730000.1.unpack, u206b????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: RpDMpvgd55.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: RpDMpvgd55.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, vbc.exe, 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, start.exe, 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, vbc.exe, 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmp
            Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: start.exe, 0000000B.00000002.617396677.0000000003735000.00000004.00000001.sdmp, start.exe, 00000013.00000003.473129874.0000000003D75000.00000004.00000001.sdmp, start.exe, 00000017.00000003.490802427.0000000003F25000.00000004.00000001.sdmp, vbc.exe, 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeCode function: 1_2_00CF210E push 9FC390C5h; ret
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeCode function: 1_2_00CF1118 push 98C38DC5h; ret
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeCode function: 1_2_00CEF023 pushad ; iretd
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_00F0F023 pushad ; iretd
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_00F11118 push 98C38DC5h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_00F1210E push 9FC390C5h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 9_2_0BDCA179 push EC018F44h; iretd
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_0035F023 pushad ; iretd
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00361118 push 98C38DC5h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_0036210E push 9FC390C5h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB32F5 push ss; retf
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB326C push ss; retf
            Source: C:\Users\user\AppData\Local\start.exeCode function: 11_2_00DB8930 push 000000C3h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_00981118 push 98C38DC5h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_0098210E push 9FC390C5h; ret
            Source: C:\Users\user\AppData\Local\start.exeCode function: 13_2_0097F023 pushad ; iretd
            Source: RpDMpvgd55.exeStatic PE information: section name: lUhFD
            Source: RpDMpvgd55.exeStatic PE information: section name:
            Source: start.exe.4.drStatic PE information: section name: lUhFD
            Source: start.exe.4.drStatic PE information: section name:
            Source: initial sampleStatic PE information: section name: lUhFD entropy: 7.99971985547
            Source: initial sampleStatic PE information: section name: lUhFD entropy: 7.99971985547
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\start.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\start.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ApplicationJump to behavior
            Source: C:\Users\user\AppData\Local\start.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ApplicationJump to behavior

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeFile opened: C:\Users\user\Desktop\RpDMpvgd55.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\AppData\Local\start.exeFile opened: C:\Users\user\AppData\Local\start.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\AppData\Local\start.exeFile opened: C:\Users\user\AppData\Local\start.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\AppData\Local\start.exeFile opened: C:\Users\user\AppData\Local\start.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\AppData\Local\start.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\start.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT MacAddress FROM Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT MacAddress FROM Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT MacAddress FROM Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\RpDMpvgd55.exe TID: 6956Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 6400Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 6980Thread sleep count: 122 > 30
            Source: C:\Users\user\AppData\Local\start.exe TID: 6980Thread sleep time: -122000s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 4232Thread sleep count: 85 > 30
            Source: C:\Users\user\AppData\Local\start.exe TID: 4232Thread sleep time: -85000s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 4240Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 6972Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 4892Thread sleep count: 98 > 30
            Source: C:\Users\user\AppData\Local\start.exe TID: 4892Thread sleep time: -98000s >= -30000s
            Source: C:\Users\user\AppData\Local\start.exe TID: 1868Thread sleep count: 76 > 30
            Source: C:\Users\user\AppData\Local\start.exe TID: 1868Thread sleep time: -76000s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\start.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\start.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\start.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\start.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\start.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\start.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\start.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\start.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\start.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\2.0.0.0\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Hyper-V\1.1\
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Users\user\AppData\Local\start.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT ProcessorId FROM Win32_Processor
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\start.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\start.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\start.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\
            Source: start.exe, 00000011.00000002.501148038.0000000003010000.00000004.00000001.sdmpBinary or memory string: Vboxservice
            Source: start.exe, 00000011.00000002.501148038.0000000003010000.00000004.00000001.sdmpBinary or memory string: vmtools
            Source: explorer.exe, 00000008.00000002.607854267.00000000009D1000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:q
            Source: explorer.exe, 00000008.00000002.607854267.00000000009D1000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: explorer.exe, 00000008.00000002.607854267.00000000009D1000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\start.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\start.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\start.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\AppData\Local\start.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Source: C:\Users\user\AppData\Local\start.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Source: C:\Users\user\AppData\Local\start.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Source: C:\Users\user\AppData\Local\start.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 445000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 451000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 454000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 385008
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 413000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 417000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 419000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 2E5008
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 445000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 451000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 454000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 2F2008
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 445000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 451000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 454000
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 367008
            .NET source code references suspicious native API functionsShow sources
            Source: 11.2.start.exe.730000.1.unpack, u200d????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'FindResource@kernel32.dll'), ('?????????????????????????????????????????', 'capGetDriverDescriptionA@avicap32.dll'), ('?????????????????????????????????????????', 'WriteProcessMemory@kernel32.dll'), ('????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'VirtualAllocEx@kernel32.dll'), ('?????????????????????????????????????????', 'ReadProcessMemory@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
            Allocates memory in foreign processesShow sources
            Source: C:\Users\user\AppData\Local\start.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Source: C:\Users\user\AppData\Local\start.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Source: C:\Users\user\AppData\Local\start.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Source: C:\Users\user\AppData\Local\start.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Users\user\AppData\Local\start.exe base: 730000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Local\start.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\RpDMpvgd55.exe' 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeProcess created: C:\Windows\SysWOW64\explorer.exe 'C:\Windows\System32\explorer.exe' /c, 'C:\Users\user\AppData\Local\start.exe'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp8598.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp7DB4.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Users\user\AppData\Local\start.exe C:\Users\user\AppData\Local\start.exe
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpD4F0.tmp'
            Source: C:\Users\user\AppData\Local\start.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpFEB0.tmp'
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeQueries volume information: C:\Users\user\Desktop\RpDMpvgd55.exe VolumeInformation
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Users\user\AppData\Local\start.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Users\user\AppData\Local\start.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Users\user\AppData\Local\start.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Users\user\AppData\Local\start.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Users\user\AppData\Local\start.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Users\user\AppData\Local\start.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\start.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\RpDMpvgd55.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: bdagent.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: MSASCui.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avguard.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avgrsx.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avcenter.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avp.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: zlclient.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: wireshark.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avgcsrvx.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avgnt.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: hijackthis.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avgui.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: avgwdsvc.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: mbam.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: MsMpEng.exe
            Source: start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpBinary or memory string: ComboFix.exe

            Stealing of Sensitive Information:

            barindex
            Yara detected MailPassViewShow sources
            Source: Yara matchFile source: 19.3.start.exe.3d75810.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f7db5a.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5810.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3dcdb5a.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.37d1990.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 33.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3ffdb5a.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5810.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25b55.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5b55.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25810.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 33.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3ffdb5a.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3d75b55.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.37d1990.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3d75810.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3dcdb5a.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f7db5a.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25810.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.3735950.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.617396677.0000000003735000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.614686157.000000000284E000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.428810541.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000003.473129874.0000000003D75000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.490802427.0000000003F25000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1768, type: MEMORYSTR
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RpDMpvgd55.exe PID: 6900, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6344, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 3940, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTR
            Yara detected WebBrowserPassView password recovery toolShow sources
            Source: Yara matchFile source: 19.3.start.exe.3d75810.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5810.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.start.exe.36b5950.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.3735950.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.start.exe.3505950.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5810.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 25.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25b55.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5b55.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25810.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25b55.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3d75b55.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3d75810.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.3.start.exe.3fa5b55.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.start.exe.36b5950.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.3.start.exe.3d75b55.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 28.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 25.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 18.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 18.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 28.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.3.start.exe.3f25810.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.3735950.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.start.exe.3505950.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.617396677.0000000003735000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.428810541.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.614119011.00000000036B5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000003.473129874.0000000003D75000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.490802427.0000000003F25000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7032, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6728, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2232, type: MEMORYSTR
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
            Tries to steal Instant Messenger accounts or passwordsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 13.2.start.exe.4bc23e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.start.exe.730000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4aff1c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.50a23e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4dc8179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4e795c9.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.5018179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4e795c9.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4dc8179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4c295c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.490f1c9.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4db23e0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.start.exe.520000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4d28179.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4def1c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4aff1c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4b895c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4d28179.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4b9f1c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.start.exe.500000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4e523e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.490f1c9.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.50a23e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4c295c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4b38179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4bc23e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4b38179.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4db23e0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.49995c9.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.4e523e0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4def1c9.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.49995c9.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4b895c9.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.5018179.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 17.2.start.exe.4936a10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RpDMpvgd55.exe.49d6a10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.start.exe.4746a10.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.start.exe.4c26a10.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RpDMpvgd55.exe PID: 6900, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6344, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 1724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 3940, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 4928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: start.exe PID: 6428, type: MEMORYSTR
            Detected HawkEye RatShow sources
            Source: RpDMpvgd55.exe, 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: start.exe, 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: start.exe, 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: start.exe, 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: start.exe, 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: start.exe, 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles
            Source: start.exe, 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmpString found in binary or memory: _Version_Mutex_Delivery_EmailUsername_EmailPassword_EmailServer_EmailPort_EmailSSL_FTPServer_FTPUsername_FTPPassword_FTPPort_FTPSFTP_ProxyURL_ProxySecret_PanelURL_PanelSecret_LogInterval_PasswordStealer_KeyStrokeLogger_ClipboardLogger_ScreenshotLogger_WebCamLogger_SystemInfo_Install_InstallLocation_InstallFolder_InstallFileName_InstallStartup_InstallStartupPersistance_HistoryCleaner_ZoneID_HideFile_MeltFile_Disablers_DisableTaskManager_DisableCommandPrompt_DisableRegEdit_ProcessProtection_ProcessElevation_AntiVirusKiller_BotKiller_AntiDebugger_ExecutionDelay_FakeMessageShow_FakeMessageTitle_FakeMessageText_FakeMessageIcon_WebsiteVisitor_WebsiteVisitorVisible_WebsiteVisitorSites_WebsiteBlocker_WebsiteBlockerSites_FileBinder_FileBinderFiles

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation111Registry Run Keys / Startup Folder1Process Injection411Disable or Modify Tools1OS Credential Dumping1File and Directory Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery15Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsShared Modules1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Credentials In Files1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing4NTDSSecurity Software Discovery331Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection411DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 478945 Sample: RpDMpvgd55 Startdate: 07/09/2021 Architecture: WINDOWS Score: 100 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 8 other signatures 2->54 8 explorer.exe 2->8         started        10 start.exe 2 2->10         started        13 start.exe 2 2->13         started        15 RpDMpvgd55.exe 4 2->15         started        process3 file4 18 start.exe 1 3 8->18         started        76 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->76 21 start.exe 10->21         started        23 start.exe 13->23         started        46 C:\Users\user\AppData\...\RpDMpvgd55.exe.log, ASCII 15->46 dropped 25 cmd.exe 2 15->25         started        28 explorer.exe 1 15->28         started        signatures5 process6 file7 56 Antivirus detection for dropped file 18->56 58 Multi AV Scanner detection for dropped file 18->58 60 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->60 70 2 other signatures 18->70 30 start.exe 5 18->30         started        62 Writes to foreign memory regions 21->62 64 Allocates memory in foreign processes 21->64 66 Sample uses process hollowing technique 21->66 33 vbc.exe 21->33         started        68 Injects a PE file into a foreign processes 23->68 35 vbc.exe 23->35         started        44 C:\Users\user\AppData\Local\start.exe, PE32 25->44 dropped 37 conhost.exe 25->37         started        signatures8 process9 signatures10 78 Writes to foreign memory regions 30->78 80 Allocates memory in foreign processes 30->80 82 Sample uses process hollowing technique 30->82 84 Injects a PE file into a foreign processes 30->84 39 vbc.exe 30->39         started        42 vbc.exe 30->42         started        86 Tries to harvest and steal browser information (history, passwords, etc) 33->86 process11 signatures12 72 Tries to steal Instant Messenger accounts or passwords 39->72 74 Tries to steal Mail credentials (via file access) 39->74

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            RpDMpvgd55.exe72%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            RpDMpvgd55.exe100%AviraHEUR/AGEN.1101677
            RpDMpvgd55.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\start.exe100%AviraHEUR/AGEN.1101677
            C:\Users\user\AppData\Local\start.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\start.exe72%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            11.2.start.exe.2a0000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            23.2.start.exe.90000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            11.0.start.exe.2a0000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            25.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
            11.2.start.exe.730000.1.unpack100%AviraTR/Dropper.GenDownload File
            17.0.start.exe.b40000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            23.0.start.exe.90000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            23.2.start.exe.520000.1.unpack100%AviraTR/Dropper.GenDownload File
            1.2.RpDMpvgd55.exe.c30000.0.unpack100%AviraTR/Crypt.XDR.GenDownload File
            19.2.start.exe.500000.1.unpack100%AviraTR/Dropper.GenDownload File
            19.2.start.exe.60000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            28.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
            1.0.RpDMpvgd55.exe.c30000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            19.0.start.exe.60000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            13.2.start.exe.8c0000.0.unpack100%AviraTR/Crypt.XDR.GenDownload File
            9.2.start.exe.e50000.0.unpack100%AviraTR/Crypt.XDR.GenDownload File
            13.0.start.exe.8c0000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            18.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
            9.0.start.exe.e50000.0.unpack100%AviraHEUR/AGEN.1101677Download File
            17.2.start.exe.b40000.0.unpack100%AviraTR/Crypt.XDR.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://pomf.cat/upload.php&https://a.pomf.cat/0%Avira URL Cloudsafe
            http://pomf.cat/upload.php0%Avira URL Cloudsafe
            https://a.pomf.cat/0%Avira URL Cloudsafe
            https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gt0%URL Reputationsafe
            http://pomf.cat/upload.phpCContent-Disposition:0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://pomf.cat/upload.php&https://a.pomf.cat/RpDMpvgd55.exe, 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, start.exe, 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, start.exe, 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, start.exe, 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, start.exe, 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, start.exe, 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, start.exe, 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
              high
              http://pomf.cat/upload.phpstart.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.covbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpfalse
                high
                https://www.google.com/chrome/static/images/favicons/favicon-16x16.pngvbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                  high
                  https://contextual.media.net/medianet.phpcid=8CU157172&crid=722878611&size=306x271&https=1id=77%2C18vbc.exe, 00000012.00000003.446478560.00000000020FB000.00000004.00000001.sdmpfalse
                    high
                    https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1vbc.exe, 00000012.00000003.447122027.00000000026D1000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                      high
                      https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindexvbc.exe, 00000012.00000003.446910816.00000000020F4000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446214663.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446385375.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446277904.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446810835.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446355440.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446556696.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446779322.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446613111.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446248806.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446638409.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446434893.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446719432.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.489646915.000000000214E000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486653458.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.489814645.000000000214C000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.488085814.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.487110877.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486793663.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486411159.0000000002143000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508440923.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpfalse
                        high
                        http://www.nirsoft.netvbc.exe, 00000012.00000002.450712436.000000000019C000.00000004.00000001.sdmp, vbc.exe, 00000019.00000002.490898947.000000000019C000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000002.511307967.000000000019C000.00000004.00000001.sdmpfalse
                          high
                          https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gvbc.exe, 00000012.00000003.447412207.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.449461802.00000000020E1000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                            high
                            http://bot.whatismyipaddress.com/start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpfalse
                              high
                              https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736vbc.exe, 00000012.00000003.446879234.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                high
                                https://www.google.com/chrome/vbc.exe, 00000012.00000003.446184342.00000000020FB000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.msn.com/de-ch/?ocid=iehpvbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                    high
                                    https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000002.511848091.0000000002260000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpfalse
                                      high
                                      https://a.pomf.cat/start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.msn.com/?ocid=iehpvbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                          high
                                          https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                            high
                                            https://contextual.media.net/checksync.phpvbc.exe, 00000012.00000003.446410926.00000000020F3000.00000004.00000001.sdmpfalse
                                              high
                                              https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://cvbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508440923.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpfalse
                                                high
                                                https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.nirsoft.net/vbc.exe, 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmpfalse
                                                    high
                                                    https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510766984.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.510593008.000000000225E000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508440923.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508838804.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508608382.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508723934.000000000225D000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtvbc.exe, 00000012.00000003.446910816.00000000020F4000.00000004.00000001.sdmp, vbc.exe, 00000012.00000003.446016500.00000000020ED000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486194410.000000000213D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508869440.0000000002241000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.msn.com/?ocid=iehphttp://www.msn.com/?vbc.exe, 00000012.00000003.446575309.00000000020F3000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://pomf.cat/upload.phpCContent-Disposition:start.exe, 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, start.exe, 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, start.exe, 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/vbc.exe, 00000012.00000003.446854849.00000000020F3000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.488085814.000000000214D000.00000004.00000001.sdmp, vbc.exe, 00000019.00000003.486588561.0000000002143000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.509662542.000000000225D000.00000004.00000001.sdmp, vbc.exe, 0000001C.00000003.508578180.0000000002253000.00000004.00000001.sdmpfalse
                                                          high

                                                          Contacted IPs

                                                          No contacted IP infos

                                                          General Information

                                                          Joe Sandbox Version:33.0.0 White Diamond
                                                          Analysis ID:478945
                                                          Start date:07.09.2021
                                                          Start time:12:44:35
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 15m 8s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:light
                                                          Sample file name:RpDMpvgd55 (renamed file extension from none to exe)
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:34
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal100.phis.troj.spyw.evad.winEXE@25/10@0/0
                                                          EGA Information:Failed
                                                          HDC Information:
                                                          • Successful, ratio: 0.2% (good quality ratio 0.1%)
                                                          • Quality average: 31.8%
                                                          • Quality standard deviation: 36.4%
                                                          HCA Information:
                                                          • Successful, ratio: 90%
                                                          • Number of executed functions: 0
                                                          • Number of non-executed functions: 0
                                                          Cookbook Comments:
                                                          • Adjust boot time
                                                          • Enable AMSI
                                                          Warnings:
                                                          Show All
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/478945/sample/RpDMpvgd55.exe

                                                          Simulations

                                                          Behavior and APIs

                                                          TimeTypeDescription
                                                          12:45:41API Interceptor1x Sleep call for process: RpDMpvgd55.exe modified
                                                          12:45:56API Interceptor6x Sleep call for process: start.exe modified
                                                          12:45:56AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Application C:\Users\user\AppData\Local\start.exe -boot
                                                          12:46:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Application C:\Users\user\AppData\Local\start.exe -boot

                                                          Joe Sandbox View / Context

                                                          IPs

                                                          No context

                                                          Domains

                                                          No context

                                                          ASN

                                                          No context

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          No context

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RpDMpvgd55.exe.log
                                                          Process:C:\Users\user\Desktop\RpDMpvgd55.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):609
                                                          Entropy (8bit):5.347708444648342
                                                          Encrypted:false
                                                          SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21q1KDLI4M9XKbbDLI4MWuPJKiUrRZ9I0ZKe:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9p7
                                                          MD5:A4FC14375EBDDC11779CC066BB3E1E83
                                                          SHA1:3A0692B02588ED06D0E35A6DE2686450E1398F70
                                                          SHA-256:273BA80AF3E6DE87E26C0C5C3DEEC70707AF4DAF8C68D8E35E05D19FBC580F40
                                                          SHA-512:EA313CA134E20208052BEDE1EA1E10A392C4A5251673556DEF47786580620D4270412391F1C2030372FEF1F5F0A006E41C8FCE25CD22C8BEE91173BD84E64B76
                                                          Malicious:true
                                                          Reputation:unknown
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\start.exe.log
                                                          Process:C:\Users\user\AppData\Local\start.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):706
                                                          Entropy (8bit):5.342604339328228
                                                          Encrypted:false
                                                          SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21q1KDLI4M9XKbbDLI4MWuPJKiUrRZ9I0ZKm:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9px
                                                          MD5:3A72FBECA73A61C00EECBDEC37EAD411
                                                          SHA1:E2330F7B3182A857BB477B2492DDECC2A8488211
                                                          SHA-256:2D4310C4AB9ADEFD6169137CD8973D23D779EDD968B8B39DBC072BF888D0802C
                                                          SHA-512:260EBFB3045513A0BA14751A6B67C95CDA83DD122DC8510EF89C9C42C19F076C8C40645E0795C15ADDF57DB65513DD73EB3C5D0C883C6FB1C34165BE35AE3889
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                          C:\Users\user\AppData\Local\Temp\24b52983-2844-023d-2e9c-886bda31e7b2
                                                          Process:C:\Users\user\AppData\Local\start.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):64
                                                          Entropy (8bit):5.140319531114783
                                                          Encrypted:false
                                                          SSDEEP:3:ByXTBQuyNs+AX8VVf3PWbfcn:BENNYV1/mcn
                                                          MD5:3FFDA9E87C97BF334CACDFB5FEF216EA
                                                          SHA1:1BA32A69058FFAE9841398A8FD9D279D206E5329
                                                          SHA-256:9A9F19A828A6A8057606E972A8442474E48CF15344EBE4B812803C0B80EC56C5
                                                          SHA-512:DC3A182A593F1ED8E64009C4CD4A347A75A35156D45D0579AD5ED33D830D3BE8F84A7521782DA324E7203BAC047CCEDBEFEAA8EBE35146C2F4FCD06871E329C8
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: 6k/eK3YS2T0duwnxblQTuhY229ghIfQq6TezeFSidSeCNd0zrWqjsdo/nnmEHac9
                                                          C:\Users\user\AppData\Local\Temp\bhv25CB.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          File Type:Extensible storage user DataBase, version 0x620, checksum 0xf9eae11b, page size 32768, DirtyShutdown, Windows version 10.0
                                                          Category:dropped
                                                          Size (bytes):26738688
                                                          Entropy (8bit):0.8910213227408189
                                                          Encrypted:false
                                                          SSDEEP:24576:1h+wP17f2sZiPHihgmKdTnjVccgeTaNX:WsZqT
                                                          MD5:9B9566F47E2B75CEECFF5A7577BDF696
                                                          SHA1:83015F3A06D1989AAB2C17D5A13F070100A2828E
                                                          SHA-256:DDEA12ED30FECAD827BAD3435DA24159A6677A750B22ABEAB6CE02741371C82C
                                                          SHA-512:66DF3D2397E773080F2F10FBF3B785312883B4205F60E0BDAA7751D0A094147C0B0C8ADF083C8AB451CD9E66250B46809AE61355CE0D8063B46BA48B50FB46B5
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: ....... .......p........Ef..4...w........................%......-...y...-...y..h.'............................W.4...w..............................................................................................[............B.................................................................................................................. ........-...y?.....................................................................................................................................................................................................................................o.PA.....y?{.................R1......y?.........................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\bhvADAD.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          File Type:Extensible storage user DataBase, version 0x620, checksum 0xf9eae11b, page size 32768, DirtyShutdown, Windows version 10.0
                                                          Category:dropped
                                                          Size (bytes):26738688
                                                          Entropy (8bit):0.8976801204988787
                                                          Encrypted:false
                                                          SSDEEP:24576:1h+wP17f2sZiPHihgmKdTnjVccgeTaNX:WsZqT
                                                          MD5:A19B45FCC96F3F2111D19E5F65BE60ED
                                                          SHA1:E46224300E786AC6AF282474E079123C0F3C3E85
                                                          SHA-256:6730E0916072F37F86DFC2416827C0E59BC0B6F0DD263C8524B7859034C59500
                                                          SHA-512:07B247D21B76F3686213CB1CC556BE433DB47E0217105B373F29130011739D8A9A4622E4DCB659DB1149B95E1BB962E060B94C299103A16BD300FB1514882CAF
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: ....... .......p........Ef..4...w........................%......-...y...-...y..h.'............................W.4...w..............................................................................................[............B.................................................................................................................. ........-...y?.....................................................................................................................................................................................................................................o.PA.....y?{.................R1......y?.........................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\bhvFBFC.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          File Type:Extensible storage user DataBase, version 0x620, checksum 0xf9eae11b, page size 32768, DirtyShutdown, Windows version 10.0
                                                          Category:dropped
                                                          Size (bytes):26738688
                                                          Entropy (8bit):0.8910213227408189
                                                          Encrypted:false
                                                          SSDEEP:
                                                          MD5:9B9566F47E2B75CEECFF5A7577BDF696
                                                          SHA1:83015F3A06D1989AAB2C17D5A13F070100A2828E
                                                          SHA-256:DDEA12ED30FECAD827BAD3435DA24159A6677A750B22ABEAB6CE02741371C82C
                                                          SHA-512:66DF3D2397E773080F2F10FBF3B785312883B4205F60E0BDAA7751D0A094147C0B0C8ADF083C8AB451CD9E66250B46809AE61355CE0D8063B46BA48B50FB46B5
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: ....... .......p........Ef..4...w........................%......-...y...-...y..h.'............................W.4...w..............................................................................................[............B.................................................................................................................. ........-...y?.....................................................................................................................................................................................................................................o.PA.....y?{.................R1......y?.........................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\tmp8598.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):2
                                                          Entropy (8bit):1.0
                                                          Encrypted:false
                                                          SSDEEP:
                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: ..
                                                          C:\Users\user\AppData\Local\Temp\tmpD4F0.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):2
                                                          Entropy (8bit):1.0
                                                          Encrypted:false
                                                          SSDEEP:
                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: ..
                                                          C:\Users\user\AppData\Local\Temp\tmpFEB0.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):2
                                                          Entropy (8bit):1.0
                                                          Encrypted:false
                                                          SSDEEP:
                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                          Malicious:false
                                                          Reputation:unknown
                                                          Preview: ..
                                                          C:\Users\user\AppData\Local\start.exe
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):791552
                                                          Entropy (8bit):7.993194071005919
                                                          Encrypted:true
                                                          SSDEEP:
                                                          MD5:0E569851A5CAFFD0924437714DB46ABE
                                                          SHA1:32FE45FBEF9753D08978AD11A0001B29F032BA34
                                                          SHA-256:8FD4B32E8BC096E4F4C34BA302295CAA4ACCD453EDFF3E4A153397710FBC4A94
                                                          SHA-512:0229B9515E0BD71D7C4B2E5BC6A30DBA5B69BA761BF20A1C4A32D112D563E758284B74FF067E0815DD8207DADD40D60292AD0D7998AA501017944949E32AE7A0
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 72%
                                                          Reputation:unknown
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*..H.................R................... ....@.. ....................................@.....................................W....@.......................`..........................................................................H............lUh.FD.|.... ......................@....text....O.......P.................. ..`.rsrc........@......................@..@.reloc.......`......................@..B.................................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.993194071005919
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                          • Win32 Executable (generic) a (10002005/4) 49.96%
                                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:RpDMpvgd55.exe
                                                          File size:791552
                                                          MD5:0e569851a5caffd0924437714db46abe
                                                          SHA1:32fe45fbef9753d08978ad11a0001b29f032ba34
                                                          SHA256:8fd4b32e8bc096e4f4c34ba302295caa4accd453edff3e4a153397710fbc4a94
                                                          SHA512:0229b9515e0bd71d7c4b2e5bc6a30dba5b69ba761bf20a1c4a32d112d563e758284b74ff067e0815dd8207dadd40d60292ad0d7998aa501017944949e32ae7a0
                                                          SSDEEP:12288:8TGAG62AIMjAqahuv4riAdbaMiwilRIRP4IPIB65UM4SD7YQyV4TciTlCD3Ha9N:8TI62AS75aMiwiq4IPIBvMbGdi+qP
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*..H.................R................... ....@.. ....................................@................................

                                                          File Icon

                                                          Icon Hash:00828e8e8686b000

                                                          Static PE Info

                                                          General

                                                          Entrypoint:0x4c800a
                                                          Entrypoint Section:
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x48960B2A [Sun Aug 3 19:46:50 2008 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:v4.0.30319
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                          Entrypoint Preview

                                                          Instruction
                                                          jmp dword ptr [004C8000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al

                                                          Data Directories

                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbe3e40x57.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x610.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xc60000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0xc80000x8
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0xbe0000x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                          Sections

                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          lUhFD0x20000xbb27c0xbb400False1.00014602804data7.99971985547IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .text0xbe0000x4fc00x5000False0.726708984375data6.79648993685IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xc40000x6100x800False0.34326171875data3.53237877786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xc60000xc0x200False0.044921875data0.09262353601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          0xc80000x100x200False0.044921875dBase III DBT, version number 0, next free block index 7792960.142635768149IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                                                          Resources

                                                          NameRVASizeTypeLanguageCountry
                                                          RT_VERSION0xc40a00x380data
                                                          RT_MANIFEST0xc44200x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                          Imports

                                                          DLLImport
                                                          mscoree.dll_CorExeMain

                                                          Version Infos

                                                          DescriptionData
                                                          Translation0x0000 0x04b0
                                                          LegalCopyrightCopyright 2018 CKE Restaurants Inc.
                                                          Assembly Version0.0.0.0
                                                          InternalNamenjh.exe
                                                          FileVersion9.11.28.3
                                                          CompanyNameCKE Restaurants Inc.
                                                          Commentsuhiyivisalonevezasovozif
                                                          ProductNameHostable web core
                                                          ProductVersion9.11.28.3
                                                          FileDescriptionHostable web core
                                                          OriginalFilenamenjh.exe

                                                          Network Behavior

                                                          No network behavior found

                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:12:45:32
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\Desktop\RpDMpvgd55.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\RpDMpvgd55.exe'
                                                          Imagebase:0xc30000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000001.00000002.370358724.0000000004DC8000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000001.00000002.368874636.00000000049D6000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:12:45:39
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\RpDMpvgd55.exe' 'C:\Users\user\AppData\Local\start.exe'
                                                          Imagebase:0x2a0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:12:45:40
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff61de10000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:12:45:42
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\SysWOW64\explorer.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\explorer.exe' /c, 'C:\Users\user\AppData\Local\start.exe'
                                                          Imagebase:0x8b0000
                                                          File size:3611360 bytes
                                                          MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:12:45:44
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\explorer.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                          Imagebase:0x7ff6f22f0000
                                                          File size:3933184 bytes
                                                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:12:45:45
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\AppData\Local\start.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\AppData\Local\start.exe'
                                                          Imagebase:0xe50000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000009.00000002.441589720.0000000005018000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000009.00000002.439008892.0000000004C26000.00000004.00000001.sdmp, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 72%, ReversingLabs
                                                          Reputation:low

                                                          General

                                                          Start time:12:45:58
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\AppData\Local\start.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\start.exe
                                                          Imagebase:0x2a0000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000B.00000002.611844683.0000000002743000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000B.00000002.617396677.0000000003735000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000B.00000002.617396677.0000000003735000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000B.00000002.614686157.000000000284E000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000B.00000003.428810541.0000000003FA5000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000B.00000003.428810541.0000000003FA5000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000B.00000002.608934819.0000000000732000.00000040.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:12:46:04
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\AppData\Local\start.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\AppData\Local\start.exe' -boot
                                                          Imagebase:0x8c0000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000D.00000002.484936164.0000000004746000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000D.00000002.486549188.0000000004B38000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:12:46:12
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\AppData\Local\start.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\AppData\Local\start.exe' -boot
                                                          Imagebase:0xb40000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000002.503262589.0000000004D28000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000011.00000002.502748889.0000000004936000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:12:46:16
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp8598.tmp'
                                                          Imagebase:0x400000
                                                          File size:1171592 bytes
                                                          MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000012.00000002.450752133.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                          Reputation:high

                                                          General

                                                          Start time:12:46:19
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\AppData\Local\start.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\start.exe
                                                          Imagebase:0x60000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000013.00000002.613981984.0000000003505000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000013.00000002.611636873.0000000002582000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000013.00000002.608001079.0000000000502000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000013.00000002.611315160.0000000002511000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000013.00000003.473129874.0000000003D75000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000013.00000003.473129874.0000000003D75000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:12:46:28
                                                          Start date:07/09/2021
                                                          Path:C:\Users\user\AppData\Local\start.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\start.exe
                                                          Imagebase:0x90000
                                                          File size:791552 bytes
                                                          MD5 hash:0E569851A5CAFFD0924437714DB46ABE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000017.00000002.611611100.00000000026C3000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000017.00000002.608775895.0000000000522000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: MAL_HawkEye_Keylogger_Gen_Dec18, Description: Detects HawkEye Keylogger Reborn, Source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000017.00000002.611953012.0000000002734000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000017.00000002.614119011.00000000036B5000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000017.00000003.490802427.0000000003F25000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000017.00000003.490802427.0000000003F25000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:12:46:36
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpD4F0.tmp'
                                                          Imagebase:0x400000
                                                          File size:1171592 bytes
                                                          MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000019.00000002.491000117.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                          Reputation:high

                                                          General

                                                          Start time:12:46:47
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmpFEB0.tmp'
                                                          Imagebase:0x400000
                                                          File size:1171592 bytes
                                                          MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000001C.00000002.511356001.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                          Reputation:high

                                                          General

                                                          Start time:12:47:19
                                                          Start date:07/09/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext 'C:\Users\user\AppData\Local\Temp\tmp7DB4.tmp'
                                                          Imagebase:0x400000
                                                          File size:1171592 bytes
                                                          MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: APT_NK_BabyShark_KimJoingRAT_Apr19_1, Description: Detects BabyShark KimJongRAT, Source: 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000021.00000002.576492139.0000000000400000.00000040.00000001.sdmp, Author: Joe Security

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >