Loading ...

Play interactive tourEdit tour

Windows Analysis Report awxVepPEpA

Overview

General Information

Sample Name:awxVepPEpA (renamed file extension from none to exe)
Analysis ID:546024
MD5:110526d2882da3d46aa3d7023b00f41e
SHA1:250a483cead19e65bc11d215d48289dff51241b0
SHA256:772f0c407388e029e98f9d885f57a0e3ef9b0f42099a16fe6367fb321d4e2444
Tags:32exeRedLineStealertrojan
Infos:

Most interesting Screenshot:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Found malware configuration
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • awxVepPEpA.exe (PID: 3084 cmdline: "C:\Users\user\Desktop\awxVepPEpA.exe" MD5: 110526D2882DA3D46AA3D7023B00F41E)
    • AppLaunch.exe (PID: 1008 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe MD5: 6807F903AC06FF7E1670181378690B22)
  • cleanup

Malware Configuration

Threatname: RedLine

{"C2 url": "85.209.89.134:41320", "Bot Id": "@flop_tc"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000003.00000002.287138246.0000000000402000.00000020.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000003.231382400.0000000003722000.00000040.00000001.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: AppLaunch.exe PID: 1008JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              3.2.AppLaunch.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                0.3.awxVepPEpA.exe.3720000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.awxVepPEpA.exe.c3aec.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.2.awxVepPEpA.exe.c3aec.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmpMalware Configuration Extractor: RedLine {"C2 url": "85.209.89.134:41320", "Bot Id": "@flop_tc"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: awxVepPEpA.exeVirustotal: Detection: 53%Perma Link
                      Source: awxVepPEpA.exeMetadefender: Detection: 22%Perma Link
                      Source: awxVepPEpA.exeReversingLabs: Detection: 51%
                      Machine Learning detection for sampleShow sources
                      Source: awxVepPEpA.exeJoe Sandbox ML: detected
                      Source: awxVepPEpA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025E75E8 FindFirstFileA,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025E76C4 FindFirstFileA,GetLastError,

                      Networking:

                      barindex
                      Connects to many ports of the same IP (likely port scanning)Show sources
                      Source: global trafficTCP traffic: 85.209.89.134 ports 41320,0,1,2,3,4
                      Source: Joe Sandbox ViewASN Name: ON-LINE-DATAServerlocation-NetherlandsDrontenNL ON-LINE-DATAServerlocation-NetherlandsDrontenNL
                      Source: Joe Sandbox ViewIP Address: 85.209.89.134 85.209.89.134
                      Source: global trafficTCP traffic: 192.168.2.5:49752 -> 85.209.89.134:41320
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: unknownTCP traffic detected without corresponding DNS query: 85.209.89.134
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                      Source: AppLaunch.exe, 00000003.00000003.286676990.00000000056FB000.00000004.00000001.sdmpString found in binary or memory: http://iptc.tc4xmp
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                      Source: AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                      Source: AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                      Source: AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: awxVepPEpA.exe, 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmp, awxVepPEpA.exe, 00000000.00000003.231382400.0000000003722000.00000040.00000001.sdmp, AppLaunch.exe, 00000003.00000002.287138246.0000000000402000.00000020.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpString found in binary or memory: https://api.ip.sb/ip
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: awxVepPEpA.exe, 00000000.00000002.233926586.0000000000BEA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary:

                      barindex
                      PE file has nameless sectionsShow sources
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACCEF
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACCC7
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACCB8
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACCB1
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACC8F
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACC9E
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACD2C
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACD3C
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACD04
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026ACD1D
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025FB334
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02606658
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0261E7B0
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025F0538
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025FCADC
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025F5918
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02611CDC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_06F5EC28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_0A63E298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_0A639880
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_0A6351D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_0A63B9D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_0A63AEB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_0A637F70
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0260DC4C SetFocus,SendMessageA,DestroyWindow,DestroyWindow,DestroyWindow,DestroyWindow,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02600270: CreateFileA,DeviceIoControl,CloseHandle,
                      Source: awxVepPEpA.exeBinary or memory string: OriginalFilename vs awxVepPEpA.exe
                      Source: awxVepPEpA.exe, 00000000.00000003.228607582.0000000002580000.00000004.00000001.sdmpBinary or memory string: OriginalFilename vs awxVepPEpA.exe
                      Source: awxVepPEpA.exe, 00000000.00000003.228607582.0000000002580000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSV vs awxVepPEpA.exe
                      Source: awxVepPEpA.exe, 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSpillage.exe4 vs awxVepPEpA.exe
                      Source: awxVepPEpA.exe, 00000000.00000002.234097114.00000000025E1000.00000040.00000001.sdmpBinary or memory string: OriginalFilename vs awxVepPEpA.exe
                      Source: awxVepPEpA.exe, 00000000.00000002.234097114.00000000025E1000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameSV vs awxVepPEpA.exe
                      Source: awxVepPEpA.exe, 00000000.00000003.231411767.000000000373C000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameSpillage.exe4 vs awxVepPEpA.exe
                      Source: awxVepPEpA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
                      Source: awxVepPEpA.exeStatic PE information: Section: ZLIB complexity 1.00044194799
                      Source: awxVepPEpA.exeStatic PE information: Section: ZLIB complexity 1.00052083333
                      Source: awxVepPEpA.exeStatic PE information: Section: ZLIB complexity 1.0107421875
                      Source: awxVepPEpA.exeStatic PE information: Section: ZLIB complexity 1.00165264423
                      Source: awxVepPEpA.exeStatic PE information: Section: .rsrc ZLIB complexity 0.999701433121
                      Source: awxVepPEpA.exeVirustotal: Detection: 53%
                      Source: awxVepPEpA.exeMetadefender: Detection: 22%
                      Source: awxVepPEpA.exeReversingLabs: Detection: 51%
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\awxVepPEpA.exe "C:\Users\user\Desktop\awxVepPEpA.exe"
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/1
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025E7898 GetDiskFreeSpaceA,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: awxVepPEpA.exeStatic file information: File size 3617280 > 1048576
                      Source: awxVepPEpA.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x2f9c00
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026B367F push ss; retf
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026AC253 push ebp; iretd
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026B3635 push ss; retf
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026B0F90 push ecx; retf 0051h
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026AC46B push esp; retf 0000h
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026B1468 push ebp; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026AEC7F pushfd ; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026B2561 push edx; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026B4950 push ecx; retf
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026AD131 push edi; iretd
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026AD1A3 push cs; retf
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_3_026AF184 push ecx; iretd
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0261526C push 02615298h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02615234 push 02615260h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0260523C push 02605268h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02605204 push 02605230h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025FE2D8 push 025FE304h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0261D2BC push 0261D2E8h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02602290 push esi; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025EF344 push 025EF3A1h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02620340 push 0262036Ch; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025EC310 push 025EC37Fh; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02620308 push 02620334h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0261731C push 02617348h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025EC3C8 push 025EC3F4h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025EC390 push 025EC3BCh; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0261538C push 026153B8h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025F6028 push 025F6054h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025FE0C8 push 025FE0F4h; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0260E0A0 push 0260E0CCh; ret
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_026100A8 push 026100E0h; ret
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name:
                      Source: awxVepPEpA.exeStatic PE information: section name: .tZjoKcx
                      Source: awxVepPEpA.exeStatic PE information: section name: .adata
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_026133CC LoadLibraryA,GetProcAddress,
                      Source: awxVepPEpA.exeStatic PE information: real checksum: 0x378e0d should be: 0x381dcf
                      Source: initial sampleStatic PE information: section name: entropy: 7.99711453077
                      Source: initial sampleStatic PE information: section name: entropy: 7.9942215702
                      Source: initial sampleStatic PE information: section name: entropy: 7.79345594108
                      Source: initial sampleStatic PE information: section name: entropy: 7.97396561553
                      Source: initial sampleStatic PE information: section name: .rsrc entropy: 7.99695916307
                      Source: initial sampleStatic PE information: section name: .tZjoKcx entropy: 7.91909215806
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5036Thread sleep time: -11068046444225724s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 4600Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0260B0FC rdtsc
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeRegistry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindow / User API: threadDelayed 2391
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindow / User API: threadDelayed 3711
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025E75E8 FindFirstFileA,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025E76C4 FindFirstFileA,GetLastError,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477
                      Source: awxVepPEpA.exe, 00000000.00000002.233926586.0000000000BEA000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_026133CC LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_0260B0FC rdtsc
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_00407497 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: FBB008
                      Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSIONShow sources
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeMessage posted: Message id: QUERYENDSESSION
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 protect: page execute and read and write
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: unknown VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpy,GetLocaleInfoA,lstrlen,lstrcpy,LoadLibraryExA,lstrcpy,LoadLibraryExA,lstrcpy,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_025ED280 GetLocalTime,
                      Source: C:\Users\user\Desktop\awxVepPEpA.exeCode function: 0_2_02610558 GetVersionExA,GetVersionExA,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected RedLine StealerShow sources
                      Source: Yara matchFile source: 3.2.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.awxVepPEpA.exe.3720000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.awxVepPEpA.exe.c3aec.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.awxVepPEpA.exe.c3aec.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.287138246.0000000000402000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.231382400.0000000003722000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Tries to steal Crypto Currency WalletsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Found many strings related to Crypto-Wallets (likely being stolen)Show sources
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: %appdata%\Electrum\wallets
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: m2C:\Users\user\AppData\Roaming\Electrum\wallets\*
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: JaxxxLiberty
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: %appdata%\Ethereum\wallets
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: %appdata%\Ethereum\wallets
                      Source: AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpString found in binary or memory: m6C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: Yara matchFile source: 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: AppLaunch.exe PID: 1008, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected RedLine StealerShow sources
                      Source: Yara matchFile source: 3.2.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.awxVepPEpA.exe.3720000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.awxVepPEpA.exe.c3aec.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.awxVepPEpA.exe.c3aec.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.287138246.0000000000402000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.231382400.0000000003722000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation221Path InterceptionProcess Injection311Masquerading1OS Credential Dumping1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools11Input Capture1Security Software Discovery231Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion231Security Account ManagerProcess Discovery11SMB/Windows Admin SharesData from Local System3Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection311NTDSVirtualization/Sandbox Evasion231Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery136Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      awxVepPEpA.exe54%VirustotalBrowse
                      awxVepPEpA.exe23%MetadefenderBrowse
                      awxVepPEpA.exe51%ReversingLabsWin32.Infostealer.Convagent
                      awxVepPEpA.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.awxVepPEpA.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.0.awxVepPEpA.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.1.awxVepPEpA.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                      http://tempuri.org/0%URL Reputationsafe
                      http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id90%URL Reputationsafe
                      http://tempuri.org/Entity/Id80%URL Reputationsafe
                      http://tempuri.org/Entity/Id50%URL Reputationsafe
                      http://tempuri.org/Entity/Id40%URL Reputationsafe
                      http://tempuri.org/Entity/Id70%URL Reputationsafe
                      http://tempuri.org/Entity/Id60%URL Reputationsafe
                      http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                      http://iptc.tc4xmp0%URL Reputationsafe
                      http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                      https://api.ip.sb/ip0%URL Reputationsafe
                      http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id200%URL Reputationsafe
                      http://tempuri.org/Entity/Id210%URL Reputationsafe
                      http://tempuri.org/Entity/Id220%URL Reputationsafe
                      http://tempuri.org/Entity/Id230%URL Reputationsafe
                      http://tempuri.org/Entity/Id240%URL Reputationsafe
                      http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id100%URL Reputationsafe
                      http://tempuri.org/Entity/Id110%URL Reputationsafe
                      http://tempuri.org/Entity/Id120%URL Reputationsafe
                      http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id130%URL Reputationsafe
                      http://tempuri.org/Entity/Id140%URL Reputationsafe
                      http://tempuri.org/Entity/Id150%URL Reputationsafe
                      http://tempuri.org/Entity/Id160%URL Reputationsafe
                      http://tempuri.org/Entity/Id170%URL Reputationsafe
                      http://tempuri.org/Entity/Id180%URL Reputationsafe
                      http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id190%URL Reputationsafe
                      http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
                      http://tempuri.org/Entity/Id23Response0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sctAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                          high
                          https://duckduckgo.com/chrome_newtabAppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                              high
                              https://duckduckgo.com/ac/?q=AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpfalse
                                high
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                  high
                                  http://tempuri.org/Entity/Id12ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id2ResponseAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                    high
                                    http://tempuri.org/Entity/Id21ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                      high
                                      http://tempuri.org/Entity/Id9AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                        high
                                        http://tempuri.org/Entity/Id8AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://tempuri.org/Entity/Id5AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                          high
                                          http://tempuri.org/Entity/Id4AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://tempuri.org/Entity/Id7AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://tempuri.org/Entity/Id6AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                            high
                                            http://tempuri.org/Entity/Id19ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2004/10/wsatAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://tempuri.org/Entity/Id15ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://iptc.tc4xmpAppLaunch.exe, 00000003.00000003.286676990.00000000056FB000.00000004.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://tempuri.org/Entity/Id6ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  https://api.ip.sb/ipawxVepPEpA.exe, 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmp, awxVepPEpA.exe, 00000000.00000003.231382400.0000000003722000.00000040.00000001.sdmp, AppLaunch.exe, 00000003.00000002.287138246.0000000000402000.00000020.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://schemas.xmlsoap.org/ws/2004/04/scAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        http://tempuri.org/Entity/Id9ResponseAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=AppLaunch.exe, 00000003.00000003.282823441.00000000085E4000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289689914.0000000007615000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289564008.00000000075D9000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289641750.00000000075FF000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          http://tempuri.org/Entity/Id20AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://tempuri.org/Entity/Id21AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://tempuri.org/Entity/Id22AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            http://tempuri.org/Entity/Id23AppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              http://tempuri.org/Entity/Id24AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                http://tempuri.org/Entity/Id24ResponseAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://tempuri.org/Entity/Id1ResponseAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                    high
                                                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                      high
                                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                        high
                                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                            high
                                                                                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                              high
                                                                                              http://schemas.xmlsoap.org/ws/2004/08/addressingAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                    high
                                                                                                    http://schemas.xmlsoap.org/ws/2004/04/trustAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                      high
                                                                                                      http://tempuri.org/Entity/Id10AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://tempuri.org/Entity/Id11AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://tempuri.org/Entity/Id12AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://tempuri.org/Entity/Id16ResponseAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                        high
                                                                                                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                          high
                                                                                                          http://tempuri.org/Entity/Id13AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://tempuri.org/Entity/Id14AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://tempuri.org/Entity/Id15AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://tempuri.org/Entity/Id16AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/trust/NonceAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                            high
                                                                                                            http://tempuri.org/Entity/Id17AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://tempuri.org/Entity/Id18AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://tempuri.org/Entity/Id5ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://tempuri.org/Entity/Id19AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultDAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                              high
                                                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                                high
                                                                                                                http://tempuri.org/Entity/Id10ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://schemas.xmlsoap.org/ws/2005/02/trust/RenewAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                  high
                                                                                                                  http://tempuri.org/Entity/Id8ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                    high
                                                                                                                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                      high
                                                                                                                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                        high
                                                                                                                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                          high
                                                                                                                          http://schemas.xmlsoap.org/ws/2006/02/addressingidentityAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                            high
                                                                                                                            http://schemas.xmlsoap.org/soap/envelope/AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                                              high
                                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                high
                                                                                                                                http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                  high
                                                                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trustAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/RollbackAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://tempuri.org/Entity/Id23ResponseAppLaunch.exe, 00000003.00000002.289112352.00000000071EB000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmp, AppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                      • URL Reputation: safe
                                                                                                                                      unknown
                                                                                                                                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://schemas.xmlsoap.org/ws/2004/06/addressingexAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://schemas.xmlsoap.org/ws/2004/10/wscoorAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://schemas.xmlsoap.org/ws/2004/04/security/trust/NonceAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                              high
                                                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponseAppLaunch.exe, 00000003.00000002.289000008.00000000070E1000.00000004.00000001.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/RenewAppLaunch.exe, 00000003.00000002.289055313.0000000007170000.00000004.00000001.sdmpfalse
                                                                                                                                                  high

                                                                                                                                                  Contacted IPs

                                                                                                                                                  • No. of IPs < 25%
                                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                                  • 75% < No. of IPs

                                                                                                                                                  Public

                                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                  85.209.89.134
                                                                                                                                                  unknownUkraine
                                                                                                                                                  204601ON-LINE-DATAServerlocation-NetherlandsDrontenNLtrue

                                                                                                                                                  General Information

                                                                                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                                  Analysis ID:546024
                                                                                                                                                  Start date:28.12.2021
                                                                                                                                                  Start time:20:07:09
                                                                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                                                                  Overall analysis duration:0h 6m 52s
                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                  Report type:light
                                                                                                                                                  Sample file name:awxVepPEpA (renamed file extension from none to exe)
                                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                  Number of analysed new started processes analysed:24
                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                                  Technologies:
                                                                                                                                                  • HCA enabled
                                                                                                                                                  • EGA enabled
                                                                                                                                                  • HDC enabled
                                                                                                                                                  • AMSI enabled
                                                                                                                                                  Analysis Mode:default
                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                  Detection:MAL
                                                                                                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@0/1
                                                                                                                                                  EGA Information:Failed
                                                                                                                                                  HDC Information:
                                                                                                                                                  • Successful, ratio: 1.9% (good quality ratio 1.5%)
                                                                                                                                                  • Quality average: 57.3%
                                                                                                                                                  • Quality standard deviation: 40.5%
                                                                                                                                                  HCA Information:
                                                                                                                                                  • Successful, ratio: 70%
                                                                                                                                                  • Number of executed functions: 0
                                                                                                                                                  • Number of non-executed functions: 0
                                                                                                                                                  Cookbook Comments:
                                                                                                                                                  • Adjust boot time
                                                                                                                                                  • Enable AMSI
                                                                                                                                                  Warnings:
                                                                                                                                                  Show All
                                                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                                                  • TCP Packets have been reduced to 100
                                                                                                                                                  • Excluded IPs from analysis (whitelisted): 92.122.145.220
                                                                                                                                                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                                                                                                                  Simulations

                                                                                                                                                  Behavior and APIs

                                                                                                                                                  TimeTypeDescription
                                                                                                                                                  20:08:22API Interceptor35x Sleep call for process: AppLaunch.exe modified

                                                                                                                                                  Joe Sandbox View / Context

                                                                                                                                                  IPs

                                                                                                                                                  No context

                                                                                                                                                  Domains

                                                                                                                                                  No context

                                                                                                                                                  ASN

                                                                                                                                                  No context

                                                                                                                                                  JA3 Fingerprints

                                                                                                                                                  No context

                                                                                                                                                  Dropped Files

                                                                                                                                                  No context

                                                                                                                                                  Created / dropped Files

                                                                                                                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                                                                                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):2291
                                                                                                                                                  Entropy (8bit):5.3192079301865585
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:48:MOfHK5HKXAHKhBHKdHKB1AHKzvQTHmYHKhQnoPtHoxHImHKAHK1HxLHG1qHqH5HX:vq5qXAqLqdqUqzcGYqhQnoPtIxHbqAqG
                                                                                                                                                  MD5:174E563C986AB09114A6F31F870A6E13
                                                                                                                                                  SHA1:F68EFDC04D0559B24C448E629A0115F2E6C3B39D
                                                                                                                                                  SHA-256:465C8001CEFD747AF8A94EDD62CC829D8DFF4D6BED174591DA0B71E10FDC584F
                                                                                                                                                  SHA-512:252A2B615BB7BB4223F0873F41CC7C4BC6576172CD704DD93926E004CD5795CA5DC2DE3332586BF3C44E0B564148A7661563C00B204649C7A5594C097C1E9ECE
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.IdentityModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=

                                                                                                                                                  Static File Info

                                                                                                                                                  General

                                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                  Entropy (8bit):7.998681450351388
                                                                                                                                                  TrID:
                                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                  File name:awxVepPEpA.exe
                                                                                                                                                  File size:3617280
                                                                                                                                                  MD5:110526d2882da3d46aa3d7023b00f41e
                                                                                                                                                  SHA1:250a483cead19e65bc11d215d48289dff51241b0
                                                                                                                                                  SHA256:772f0c407388e029e98f9d885f57a0e3ef9b0f42099a16fe6367fb321d4e2444
                                                                                                                                                  SHA512:46b4bd385342adcbbf52037d8c6b68609aed852dafde949022715f40f18af30f31497f30f49cdc1d0d9cb98a569d8b93079288b0b1926414413a0c20074ad6c6
                                                                                                                                                  SSDEEP:98304:4/lpBz0Mi19cNcuurKu0stiPJajebo04XY4OiCKU:4/lEz9cNnuRDOKio04vOiCR
                                                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a................. ...................@....@..........................0U.......7....................................

                                                                                                                                                  File Icon

                                                                                                                                                  Icon Hash:00828e8e8686b000

                                                                                                                                                  Static PE Info

                                                                                                                                                  General

                                                                                                                                                  Entrypoint:0x401000
                                                                                                                                                  Entrypoint Section:
                                                                                                                                                  Digitally signed:false
                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                  Subsystem:windows gui
                                                                                                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                                                                                                                                                  Time Stamp:0x61C6DCEB [Sat Dec 25 08:57:15 2021 UTC]
                                                                                                                                                  TLS Callbacks:
                                                                                                                                                  CLR (.Net) Version:
                                                                                                                                                  OS Version Major:6
                                                                                                                                                  OS Version Minor:0
                                                                                                                                                  File Version Major:6
                                                                                                                                                  File Version Minor:0
                                                                                                                                                  Subsystem Version Major:6
                                                                                                                                                  Subsystem Version Minor:0
                                                                                                                                                  Import Hash:c284fa365c4442728ac859c0f9ed4dc5

                                                                                                                                                  Entrypoint Preview

                                                                                                                                                  Instruction
                                                                                                                                                  push 00907001h
                                                                                                                                                  call 00007F9CFCE565E6h
                                                                                                                                                  ret
                                                                                                                                                  ret
                                                                                                                                                  js 00007F9CFCE56633h
                                                                                                                                                  jnp 00007F9CFCE5659Eh
                                                                                                                                                  mov dword ptr [0FDE1067h], eax
                                                                                                                                                  lodsd
                                                                                                                                                  lahf
                                                                                                                                                  mov bx, seg?
                                                                                                                                                  xchg eax, ebp
                                                                                                                                                  jns 00007F9CFCE5656Bh
                                                                                                                                                  mov esi, EBD5F1E6h
                                                                                                                                                  cld
                                                                                                                                                  cmp cl, byte ptr [esi+edx]
                                                                                                                                                  or byte ptr [eax-1Ch], FFFFFFD5h
                                                                                                                                                  out 44h, al
                                                                                                                                                  call 00007F9D730C6374h
                                                                                                                                                  cmp esi, dword ptr [esp]
                                                                                                                                                  mov esi, edi
                                                                                                                                                  pop ds
                                                                                                                                                  inc eax
                                                                                                                                                  salc
                                                                                                                                                  pushad
                                                                                                                                                  inc ebp
                                                                                                                                                  outsd
                                                                                                                                                  push ds
                                                                                                                                                  out A0h, al
                                                                                                                                                  into
                                                                                                                                                  jno 00007F9CFCE565F7h
                                                                                                                                                  pop ss
                                                                                                                                                  cmc
                                                                                                                                                  pop edi

                                                                                                                                                  Data Directories

                                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x507c7c0x120.tZjoKcx
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4ec0000x1a21d.rsrc
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x507c080x8.tZjoKcx
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x100000

                                                                                                                                                  Sections

                                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                  0x10000x220000x11200False1.00044194799data7.99711453077IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  0x230000x47c0x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  0x240000xf0000x7800False1.00052083333data7.9942215702IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  0x330000x20000x400False1.0107421875data7.79345594108IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  0x350000x1888fe0x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  0x1be0000x32b0000x2f9c00unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  0x4e90000x30000x1a00False1.00165264423data7.97396561553IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  .rsrc0x4ec0000x1b0000x13a00False0.999701433121data7.99695916307IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  .tZjoKcx0x5070000x4b0000x4b000False0.987112630208data7.91909215806IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                                                  .adata0x5520000x10000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

                                                                                                                                                  Resources

                                                                                                                                                  NameRVASizeTypeLanguageCountry
                                                                                                                                                  RT_RCDATA0x4ec0a00x1a000dataRussianRussia
                                                                                                                                                  RT_MANIFEST0x507d9c0x17dXML 1.0 document textEnglishUnited States

                                                                                                                                                  Imports

                                                                                                                                                  DLLImport
                                                                                                                                                  kernel32.dllGetProcAddress, GetModuleHandleA, LoadLibraryA
                                                                                                                                                  user32.dllSendNotifyMessageA
                                                                                                                                                  user32.dllGetProcessWindowStation
                                                                                                                                                  oleaut32.dllVariantChangeTypeEx
                                                                                                                                                  kernel32.dllRaiseException

                                                                                                                                                  Possible Origin

                                                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                                                  RussianRussia
                                                                                                                                                  EnglishUnited States

                                                                                                                                                  Network Behavior

                                                                                                                                                  Network Port Distribution

                                                                                                                                                  TCP Packets

                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                  Dec 28, 2021 20:08:11.665426970 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:11.698582888 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:11.698685884 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:11.899445057 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:11.929229975 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:11.981901884 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:13.108572960 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:13.142590046 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:13.185185909 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:19.430566072 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:19.495527983 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:19.495614052 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:19.495673895 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:19.495748043 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:19.545079947 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:22.629884958 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:22.665580988 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:22.679788113 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:22.717155933 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:22.739634991 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:22.768918037 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:22.811012983 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:22.849545002 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:22.877779961 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:22.950139999 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:22.969736099 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:23.003166914 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:23.029328108 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:23.060345888 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:23.107904911 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:23.235726118 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:23.266292095 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:23.311031103 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:24.631264925 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:24.667284966 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:24.669308901 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:24.703490973 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:24.748727083 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:24.850198984 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:24.880192995 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:24.920511961 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:24.972430944 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:25.003037930 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:25.045531034 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:25.209330082 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:25.237601042 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:25.239430904 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:25.279891014 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:25.668306112 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:25.697880983 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:25.748706102 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.614026070 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.642503977 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.642548084 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.642576933 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.642791033 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.642936945 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.643629074 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.672018051 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.672061920 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.672089100 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.672344923 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.672503948 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.672569036 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.700687885 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.700887918 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.700906038 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.701283932 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.701417923 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.701621056 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.701761961 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.703800917 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.704225063 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.706481934 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.730961084 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.731008053 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.731345892 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.731450081 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.731770039 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.731801033 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.732215881 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.732511997 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.732553005 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.732587099 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.759797096 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.759845018 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.762768030 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.762813091 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.762841940 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.764422894 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.764590025 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.764739990 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.764950037 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.765068054 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.765086889 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.765144110 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.765208960 CET4975241320192.168.2.585.209.89.134
                                                                                                                                                  Dec 28, 2021 20:08:26.793767929 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.793823004 CET413204975285.209.89.134192.168.2.5
                                                                                                                                                  Dec 28, 2021 20:08:26.793848991 CET413204975285.209.89.134192.168.2.5

                                                                                                                                                  Code Manipulations

                                                                                                                                                  Statistics

                                                                                                                                                  Behavior

                                                                                                                                                  Click to jump to process

                                                                                                                                                  System Behavior

                                                                                                                                                  General

                                                                                                                                                  Start time:20:07:59
                                                                                                                                                  Start date:28/12/2021
                                                                                                                                                  Path:C:\Users\user\Desktop\awxVepPEpA.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:"C:\Users\user\Desktop\awxVepPEpA.exe"
                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                  File size:3617280 bytes
                                                                                                                                                  MD5 hash:110526D2882DA3D46AA3D7023B00F41E
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:Borland Delphi
                                                                                                                                                  Yara matches:
                                                                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.231691926.00000000000C2000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.231382400.0000000003722000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                                                  Reputation:low

                                                                                                                                                  General

                                                                                                                                                  Start time:20:08:00
                                                                                                                                                  Start date:28/12/2021
                                                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                  Imagebase:0x13d0000
                                                                                                                                                  File size:98912 bytes
                                                                                                                                                  MD5 hash:6807F903AC06FF7E1670181378690B22
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                                                                  Yara matches:
                                                                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000003.00000002.287138246.0000000000402000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.289189345.0000000007249000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                                                  Reputation:moderate

                                                                                                                                                  Disassembly

                                                                                                                                                  Code Analysis

                                                                                                                                                  Reset < >