Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qpwx2wT5ky.exe

Overview

General Information

Sample Name:qpwx2wT5ky.exe
Analysis ID:562520
MD5:c22c0fdbc19dcd4838709bbaca921f56
SHA1:4cd9280315ce4ff97cdb95d7dd6d8fcb7715f292
SHA256:d72ff8708ffeb9a95f559828938dc1439884e7c224579127418e285b1aa1d235
Tags:exeRaccoonStealer
Infos:

Detection

Raccoon
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Raccoon Stealer
Antivirus detection for URL or domain
Writes to foreign memory regions
.NET source code references suspicious native API functions
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to steal Internet Explorer form passwords
Allocates memory in foreign processes
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Moves itself to temp directory
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • qpwx2wT5ky.exe (PID: 6428 cmdline: "C:\Users\user\Desktop\qpwx2wT5ky.exe" MD5: C22C0FDBC19DCD4838709BBACA921F56)
    • LaunchWinApp.exe (PID: 5980 cmdline: C:\Windows\SysWOW64\LaunchWinApp.exe MD5: 529B7E6E938EA6C3BCA2821EB525BBD7)
      • WerFault.exe (PID: 5952 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"RC4_key2": "5611095ee49218feb5b751c501370b8c", "C2 url": ["http://188.166.1.115/hdm3prapor", "http://91.219.236.139/hdm3prapor", "http://194.180.174.147/hdm3prapor", "http://185.3.95.153/hdm3prapor", "http://185.163.204.22/hdm3prapor", "https://t.me/hdm3prapor"], "Bot ID": "79e83b057f17f4dd954bc4809f7290094846fc1f", "RC4_key1": "jY1aN3zZ2j"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
      00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
        00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_RaccoonRaccoon stealer payloadditekSHen
        • 0x7e47c:$s1: inetcomm server passwords
        • 0x86f44:$s4: CredEnumerateW
        • 0x7e048:$s5: %[^:]://%[^/]%[^
        • 0x7e064:$s6: %99[^:]://%99[^/]%99[^
        • 0x7b050:$s8: m_it.object_iterator != m_object->m_value.object->end()
        • 0x7d728:$x1: endptr == token_buffer.data() + token_buffer.size()
        • 0x7d0e8:$x2: \json.hpp
        • 0x7da34:$x3: Microsoft_WinInet_
        • 0x7db44:$x3: Microsoft_WinInet_
        • 0x7db44:$x4: Microsoft_WinInet_*
        00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
          Click to see the 29 entries
          SourceRuleDescriptionAuthorStrings
          0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
              • 0x8ee04:$e1: Microsoft\Windows Defender\Exclusions\Paths
              • 0x8ee60:$e2: Add-MpPreference -ExclusionPath
              0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMDDetects Windows exceutables bypassing UAC using CMSTP utility, command line and INFditekSHen
              • 0x903e3:$s1: c:\windows\system32\cmstp.exe
              • 0x9017f:$s2: taskkill /IM cmstp.exe /F
              • 0x9003b:$s5: RunPreSetupCommands=RunPreSetupCommandsSection
              • 0x90271:$s6: "HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
              0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOMDetects executables embedding command execution via IExecuteCommand COM objectditekSHen
              • 0x8ebd2:$r1: Classes\Folder\shell\open\command
              • 0x8ec16:$k1: DelegateExecute
              • 0x8ead2:$s1: /EXEFilename "{0}
              • 0x8eaf8:$s2: /WindowState ""
              • 0x904e6:$s2: /WindowState ""
              • 0x8eb22:$s3: /PriorityClass ""32"" /CommandLine "
              • 0x9050c:$s3: /PriorityClass ""32"" /CommandLine "
              • 0x8eb6e:$s4: /StartDirectory "
              • 0x90558:$s4: /StartDirectory "
              • 0x8eb94:$s5: /RunAs
              • 0x9057e:$s5: /RunAs
              Click to see the 77 entries
              No Sigma rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: qpwx2wT5ky.exeVirustotal: Detection: 47%Perma Link
              Source: qpwx2wT5ky.exeMetadefender: Detection: 23%Perma Link
              Source: qpwx2wT5ky.exeReversingLabs: Detection: 66%
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR
              Source: http://185.163.204.22/hdm3praporAvira URL Cloud: Label: malware
              Source: http://188.166.1.115/hdm3praporAvira URL Cloud: Label: malware
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00410327 __EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040E6DD __EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040CB3A __EH_prolog,BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,LocalAlloc,BCryptDecrypt,BCryptCloseAlgorithmProvider,BCryptDestroyKey,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00428EC4 CryptAcquireContextA,CryptCreateHash,lstrlenW,CryptHashData,CryptGetHashParam,wsprintfW,lstrcatW,wsprintfW,lstrcatW,CryptDestroyHash,CryptReleaseContext,lstrlenW,CryptUnprotectData,LocalFree,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00434EB9 lstrlenW,lstrlenW,lstrlenW,CryptUnprotectData,LocalFree,lstrlenW,lstrlenW,lstrlenW,wsprintfA,lstrlenA,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429097 lstrlenW,lstrlenW,lstrlenW,CredEnumerateW,CryptUnprotectData,LocalFree,CredFree,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040F186 __EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040D1A3 __EH_prolog,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041FC20 __EH_prolog,_strlen,CryptStringToBinaryA,

              Exploits

              barindex
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: qpwx2wT5ky.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: qpwx2wT5ky.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb_ source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shcore.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winnsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shell32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.473103575.00000000053B3000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: userenv.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdbe source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winhttp.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: profapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: sechost.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdbf source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: webio.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ole32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msasn1.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: sechost.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: combase.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernelbase.pdb source: WerFault.exe, 00000010.00000002.502132177.0000000002F52000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: c:\TFS\DevDiv\OC-CT-Main23Rel-Dev14\src\src\Waverton\Cct.Contracts.Public\obj\VS140\Release\Release\Microsoft.VisualStudio.WindowsAzure.Contracts.2.3.pdb source: qpwx2wT5ky.exe
              Source: Binary string: cryptbase.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: crypt32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004604F2 FindFirstFileExW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043F85B FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043615F __EH_prolog,GetLogicalDriveStringsA,

              Networking

              barindex
              Source: TrafficSnort IDS: 2034960 ET TROJAN Win32.Raccoon Stealer Checkin M6 194.180.174.147:80 -> 192.168.2.3:49814
              Source: Malware configuration extractorURLs: http://188.166.1.115/hdm3prapor
              Source: Malware configuration extractorURLs: http://91.219.236.139/hdm3prapor
              Source: Malware configuration extractorURLs: http://194.180.174.147/hdm3prapor
              Source: Malware configuration extractorURLs: http://185.3.95.153/hdm3prapor
              Source: Malware configuration extractorURLs: http://185.163.204.22/hdm3prapor
              Source: Malware configuration extractorURLs: https://t.me/hdm3prapor
              Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 194.180.174.147
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Content-Length: 128Host: 159.223.25.220
              Source: Joe Sandbox ViewIP Address: 188.166.1.115 188.166.1.115
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 28 Jan 2022 23:12:35 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingData Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: a2<html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: WerFault.exe, 00000010.00000002.503229027.0000000005329000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.500486218.0000000005329000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: Amcache.hve.16.drString found in binary or memory: http://upx.sf.net
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Content-Length: 128Host: 159.223.25.220
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 194.180.174.147
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042B173 __EH_prolog,GdiplusStartup,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,_mbstowcs,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: qpwx2wT5ky.exe, OuCPJ4q0f2/D5GjPfY8gl.csLarge array initialization: h6MujDbFZc: array initializer size 917520
              Source: qpwx2wT5ky.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_017720B0
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177B548
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_017797A8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177784B
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_01775FA8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F160
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F120
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1FC
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1BA
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1A2
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F0F1
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177B53F
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177B538
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F512
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F971
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F939
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F9A0
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA5280
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AAB240
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA5E10
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA0D90
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA8D48
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA66A0
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA6690
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA6648
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA4570
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA4540
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AAB230
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA5262
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA60CA
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA60DC
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AABE28
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA5E00
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AABE18
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA6B1B
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA19A1
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA59E8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA59F8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA19D8
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00424AE3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042B39F
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044E1E3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041828E
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00410327
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041C41C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040E6DD
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043670C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045E889
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00462915
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00416A44
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041EA4E
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043EB1A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041CD2C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041ADCA
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044AEC0
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00448F57
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AF13
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00410F9C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045B033
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040F186
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040D1A3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429260
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004652C6
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041F3F5
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043543D
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041D56F
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00411675
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00443740
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00419719
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004378ED
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045D97C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041D901
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004219E2
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042DB88
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00437D4A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044DD54
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041FDB7
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429E5B
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044DF86
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043DF8D
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 00468510 appears 179 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 0044FBAF appears 80 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 00440CFA appears 202 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 00414066 appears 194 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 004414A0 appears 58 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043FC3C: DeviceIoControl,GetLastError,
              Source: qpwx2wT5ky.exeBinary or memory string: OriginalFilename vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.319124765.00000000043CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000000.296234840.0000000000E23000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHospital_project.exeR vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.302712970.0000000004953000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.319540650.000000000460E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.319282911.00000000044EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.317907078.0000000003431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.320644906.0000000004717000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.302587573.0000000004832000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exeBinary or memory string: OriginalFilenameHospital_project.exeR vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: qpwx2wT5ky.exeVirustotal: Detection: 47%
              Source: qpwx2wT5ky.exeMetadefender: Detection: 23%
              Source: qpwx2wT5ky.exeReversingLabs: Detection: 66%
              Source: qpwx2wT5ky.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\qpwx2wT5ky.exe "C:\Users\user\Desktop\qpwx2wT5ky.exe"
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess created: C:\Windows\SysWOW64\LaunchWinApp.exe C:\Windows\SysWOW64\LaunchWinApp.exe
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess created: C:\Windows\SysWOW64\LaunchWinApp.exe C:\Windows\SysWOW64\LaunchWinApp.exe
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qpwx2wT5ky.exe.logJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDED.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@4/7@0/4
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042918B CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree,
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00439308 __EH_prolog,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,OpenProcessToken,DuplicateTokenEx,CloseHandle,GetModuleFileNameA,_strlen,_mbstowcs,CreateProcessWithTokenW,CloseHandle,Process32NextW,
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5980
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeMutant created: \Sessions\1\BaseNamedObjects\userkO$1iC2$uM3b$M1a
              Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: qpwx2wT5ky.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: qpwx2wT5ky.exeStatic file information: File size 1128960 > 1048576
              Source: qpwx2wT5ky.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: qpwx2wT5ky.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x113200
              Source: qpwx2wT5ky.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: qpwx2wT5ky.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb_ source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shcore.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winnsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shell32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.473103575.00000000053B3000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: userenv.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdbe source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winhttp.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: profapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: sechost.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdbf source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: webio.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ole32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msasn1.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: sechost.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: combase.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernelbase.pdb source: WerFault.exe, 00000010.00000002.502132177.0000000002F52000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: c:\TFS\DevDiv\OC-CT-Main23Rel-Dev14\src\src\Waverton\Cct.Contracts.Public\obj\VS140\Release\Release\Microsoft.VisualStudio.WindowsAzure.Contracts.2.3.pdb source: qpwx2wT5ky.exe
              Source: Binary string: cryptbase.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: crypt32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_01775F98 push esp; ret
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AABA48 push es; retn 0004h
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00468510 push eax; ret
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0046852F push eax; ret
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00468580 push eax; ret
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00440FB1 push ecx; ret
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00434E00 LoadLibraryA,GetProcAddress,FreeLibrary,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.39943250791

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v 3 /t REG_DWORD /d 0
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v 3 /t REG_DWORD /d 0
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: c:\users\user\desktop\qpwx2wt5ky.exeFile moved: C:\Users\user\AppData\Local\Temp\8a5117119915447493a5b09e32efc8ff.tmpJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041F3F5 __EH_prolog,SetCurrentDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000002.317216371.0000000003271000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL/WINE_GET_UNIX_FILE_NAMEQEMU
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exe TID: 4972Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\SysWOW64\LaunchWinApp.exe TID: 5452Thread sleep time: -90000s >= -30000s
              Source: C:\Windows\SysWOW64\LaunchWinApp.exe TID: 5568Thread sleep time: -30000s >= -30000s
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeAPI coverage: 4.3 %
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information queried: ProcessInformation
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00437D4A __EH_prolog,_strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004604F2 FindFirstFileExW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043F85B FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043615F __EH_prolog,GetLogicalDriveStringsA,
              Source: Amcache.hve.16.drBinary or memory string: VMware
              Source: WerFault.exe, 00000010.00000003.500364191.00000000053B6000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.500236208.00000000053B2000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.500024980.00000000053B2000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000002.503283976.00000000053B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6
              Source: Amcache.hve.16.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
              Source: WerFault.exe, 00000010.00000002.503165059.00000000052F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
              Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.me
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: Amcache.hve.16.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBoxARun using valid operating systemUSER
              Source: Amcache.hve.16.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREESOFTWARE\VMware, Inc.\VMware Tools
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
              Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.16.drBinary or memory string: VMware7,1
              Source: Amcache.hve.16.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.16.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.16.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.16.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.16.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: kernel32.dll/wine_get_unix_file_nameQEMU
              Source: Amcache.hve.16.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VIRTUALBOXUSOFTWARE\Oracle\VirtualBox Guest Additions!noValueButYesKeySC:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathKC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\OC:\WINDOWS\system32\drivers\vmmouse.sysMC:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00446AC8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00434E00 LoadLibraryA,GetProcAddress,FreeLibrary,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040D1A3 __EH_prolog,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess token adjusted: Debug
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AAC7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AAF8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AA83 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00447699 mov eax, dword ptr fs:[00000030h]
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeProcess queried: DebugPort
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory allocated: page read and write | page guard
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00441435 SetUnhandledExceptionFilter,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00446AC8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004412D2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00441692 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 400000
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 401000
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 46E000
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 488000
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 48E000
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 48F000
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 2BD0008
              Source: qpwx2wT5ky.exe, OuCPJ4q0f2/d4eQdQGngr.csReference to suspicious API methods: ('fhrGuUGcd4', 'GetProcAddress@kernel32.dll'), ('aiIB2IyVDl', 'VirtualProtect@kernel32.dll'), ('MhNAKwwAxy', 'LoadLibrary@kernel32.dll')
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory allocated: C:\Windows\SysWOW64\LaunchWinApp.exe base: 400000 protect: page execute and read and write
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess created: C:\Windows\SysWOW64\LaunchWinApp.exe C:\Windows\SysWOW64\LaunchWinApp.exe
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeQueries volume information: C:\Users\user\Desktop\qpwx2wT5ky.exe VolumeInformation
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: __EH_prolog,CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,Sleep,GetUserNameA,Sleep,_strlen,_strlen,StrToIntA,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,StrToIntA,CreateThread,CreateThread,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,lstrlenA,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,CoUninitialize,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: __EH_prolog,_strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004410F5 cpuid
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004525EA GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043771D __EH_prolog,GetTimeZoneInformation,std::ios_base::_Ios_base_dtor,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429260 GetVersionExW,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00436235 GetUserNameA,
              Source: Amcache.hve.LOG1.16.dr, Amcache.hve.16.drBinary or memory string: c:\users\user\desktop\procexp.exe
              Source: Amcache.hve.16.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.LOG1.16.dr, Amcache.hve.16.drBinary or memory string: procexp.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: Software\Microsoft\Internet Explorer\IntelliForms\Storage2

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts11
              Native API
              Path Interception311
              Process Injection
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium3
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Deobfuscate/Decode Files or Information
              1
              Credentials In Files
              1
              Account Discovery
              Remote Desktop Protocol1
              Screen Capture
              Exfiltration Over Bluetooth2
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
              Software Packing
              NTDS35
              System Information Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer13
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items311
              Process Injection
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              Hidden Users
              Proc Filesystem1
              System Owner/User Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
              Remote System Discovery
              Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              qpwx2wT5ky.exe48%VirustotalBrowse
              qpwx2wT5ky.exe24%MetadefenderBrowse
              qpwx2wT5ky.exe67%ReversingLabsByteCode-MSIL.Infostealer.Racealer
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              2.2.LaunchWinApp.exe.400000.0.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.0.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.8.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.4.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.7.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.2.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.6.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.3.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.1.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.5.unpack100%AviraHEUR/AGEN.1143241Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://91.219.236.139/hdm3prapor2%VirustotalBrowse
              http://91.219.236.139/hdm3prapor0%Avira URL Cloudsafe
              http://185.163.204.22/hdm3prapor100%Avira URL Cloudmalware
              http://194.180.174.147/hdm3prapor1%VirustotalBrowse
              http://194.180.174.147/hdm3prapor0%Avira URL Cloudsafe
              http://185.3.95.153/hdm3prapor0%Avira URL Cloudsafe
              http://159.223.25.220/0%Avira URL Cloudsafe
              http://188.166.1.115/hdm3prapor100%Avira URL Cloudmalware
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://91.219.236.139/hdm3praportrue
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://185.163.204.22/hdm3praportrue
              • Avira URL Cloud: malware
              unknown
              http://194.180.174.147/hdm3praportrue
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://185.3.95.153/hdm3praportrue
              • Avira URL Cloud: safe
              unknown
              http://159.223.25.220/false
              • Avira URL Cloud: safe
              unknown
              https://t.me/hdm3praporfalse
                high
                http://188.166.1.115/hdm3praportrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://upx.sf.netAmcache.hve.16.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  188.166.1.115
                  unknownNetherlands
                  14061DIGITALOCEAN-ASNUStrue
                  159.223.25.220
                  unknownUnited States
                  46118CELANESE-USfalse
                  194.180.174.147
                  unknownunknown
                  39798MIVOCLOUDMDtrue
                  91.219.236.139
                  unknownHungary
                  56322SERVERASTRA-ASHUtrue
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:562520
                  Start date:29.01.2022
                  Start time:00:10:16
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 9m 32s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:qpwx2wT5ky.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:21
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.expl.evad.winEXE@4/7@0/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 90%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 52.182.143.212
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  00:12:47API Interceptor5x Sleep call for process: LaunchWinApp.exe modified
                  00:13:44API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9168915727727842
                  Encrypted:false
                  SSDEEP:192:29rIDKfGGcHRUEMm2Fj2K/lg/u7seS274Ita:qrIgkRUEMmCjG/u7seX4Ita
                  MD5:704712E4245884343C1B53D933E0FF6A
                  SHA1:735EC03A19C628348BA75BED82093B1B0CE7A212
                  SHA-256:0E75A303D3BCF10BF5A5769CFF6CB03ADF0D7C65B06302790B3033433224CDC5
                  SHA-512:995834F87714AC2E91235362A2DA6B33CCEC59871C52771C3F85AC3545FB90CE19C58F4666BB58C476F52541FF5F0E04038E8C5B087271B747C6F342382F1146
                  Malicious:false
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.7.9.1.7.6.1.3.5.6.7.3.8.3.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.7.9.1.7.6.2.2.6.2.9.8.2.1.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.9.6.4.0.7.2.-.a.9.2.9.-.4.4.8.c.-.8.a.6.1.-.c.d.b.9.8.a.6.4.8.8.c.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.8.5.8.a.7.7.-.e.2.8.c.-.4.0.0.0.-.8.9.6.b.-.9.d.a.4.9.6.7.6.c.4.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.a.u.n.c.h.W.i.n.A.p.p...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.a.u.n.c.h.W.i.n.A.p.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.5.c.-.0.0.0.1.-.0.0.1.c.-.5.0.6.c.-.1.4.e.c.e.7.1.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.0.b.3.9.e.6.e.0.9.8.0.6.7.f.0.a.f.8.5.d.3.6.1.d.5.1.0.7.a.b.2.2.4.d.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8358
                  Entropy (8bit):3.6892430773725198
                  Encrypted:false
                  SSDEEP:192:Rrl7r3GLNip/p6Nm6Yyj61ugmf8EeS/ENrCpD589b7hsfPJm:RrlsNipB6c6YO6sgmf8EeS/EH7afM
                  MD5:DB040076D87CFF2B5E68679D4C1ED53F
                  SHA1:66CFADBBF5D16B035B0C6215E2CAAF02A43017DD
                  SHA-256:833EAB64A8B988574F0F3A7AD22F53D47CBE0EAB44B9A3E962EA9D4280202B8F
                  SHA-512:AA989CFA5D089DBE760C91EA5BAEFD952AAFF4CAB1D813C6FB77AE47A7B3F3FBC3F6F94D77FFA7271C3F784F0C17BA4E2D3D33B1ABF0A126966BF8E0A33D3499
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.8.0.<./.P.i.d.>.......
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4768
                  Entropy (8bit):4.461867495702939
                  Encrypted:false
                  SSDEEP:48:cvIwSD8zshJgtWI9HXWSC8BzM8fm8M4JRpigWcItFvx+q8vWigWcITDXGnMPrIPe:uITfzkmSNXJARKN32orchad
                  MD5:D1AF0BA5079F3DE14DD7E8051DFB5C05
                  SHA1:97CC0473AD86735F7F628D6888D4D956CE106184
                  SHA-256:D0C5DD19873B1D9B87B8571680CD3F82DA7FCF7B31DBCC54CB35C764ECAD1B9A
                  SHA-512:DBF3ABFC6C8DDE6CBCC5EABDBA57C426C30D611DD5E209E15CA83C724501248E2E5E7466E2F5295B1FEA7B0F50F7AA8868C6BEA634469CD740AEF8C1ED5ADC32
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1363284" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Sat Jan 29 08:13:37 2022, 0x1205a4 type
                  Category:dropped
                  Size (bytes):61158
                  Entropy (8bit):2.4767519839533017
                  Encrypted:false
                  SSDEEP:192:3KmU3CNYulpOCzAoVE/tsu25X0mAJZ8QXqk7xtebbqn10RWWeOAuZ+5ZHTUnDaBC:fSisC8r0+mAJZ8axt2vABsG4FmA
                  MD5:416A11DCE14D66C77506CE1A74542009
                  SHA1:DEA54DFEEF7500324613857BE92392FA40A61202
                  SHA-256:69AF6348A49402738E7EE52678C15E76C67FA123319B11CF32DED5509A324434
                  SHA-512:E541F05F091B39FBA805B22ED62E172988575D02F4225BB8D86A1A0DD15C344D2454AF4D57A905C85F6A54657C2555EA9545AD6396A4C763BC01257D31971277
                  Malicious:false
                  Reputation:low
                  Preview:MDMP....... .......1..a........................(............................0..........`.......8...........T............ ..........................p....................................................................U...........B..............GenuineIntelW...........T.......\......a.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\qpwx2wT5ky.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):617
                  Entropy (8bit):5.347480285514745
                  Encrypted:false
                  SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhat92n4M0kvoDLI4MWuCv:ML9E4Ks2wKDE4KhK3VZ9pKhg84jE4Ks
                  MD5:C090C3A5090FDB569FD50003722EDAD4
                  SHA1:878B12213721F0ED188986C03408AEFBD2F0D1AE
                  SHA-256:3D04A30D0B4C7F044488F425F4BBC78573B5AB98B9586A9C99D3760E11ED4955
                  SHA-512:157F60DD6B99B500694DFB13A3186E3F253468E03DED8075B9671337E51E89A208FA35E9263B2C0F6460205FEE89481C8EE36FD7BBCE66BB399F1D27BDF82609
                  Malicious:true
                  Reputation:low
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1572864
                  Entropy (8bit):4.2740946580710055
                  Encrypted:false
                  SSDEEP:12288:f+ty5r16YgMk9OszLl2/n1dRQAK7WN+A2wo5lKe85v5tk0GHezT/V:Gty5r16YgMk9OsCd
                  MD5:8CE94B0FFC9D2328821B50E5A619DD53
                  SHA1:5F11244FC9C2919CD1E345339803F44F06F0EEAF
                  SHA-256:FD946DB2798FB9ACA18A737898A1CA66C1BA34B9C6AD92FB637CA39822D6B6E5
                  SHA-512:C94F74438963710015DC1CABF57D0E5888EEFC29264EA402DEBD0B4E3AB2245B66E22D0B7295BB7F01A52DAA42F518212C94555344F899C4BEDC732E27FB300D
                  Malicious:false
                  Reputation:low
                  Preview:regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.......................................................................................................................................................................................................................................................................................................................................................D........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):24576
                  Entropy (8bit):4.031260608135238
                  Encrypted:false
                  SSDEEP:384:5r6l5Rftx1HPJ4XYs1Fn87kkPBqXXSeq5QMVyiy+/ql4Lk4jZd1DoXznH7tNAG:56bRftx1vJ4X91F87hBqXCeq5QMVyiyY
                  MD5:216E7FDAF7B821B8B2C10D83992D0236
                  SHA1:9FDF64BF1DE8E4F7493FBBD25268F6320306BFD1
                  SHA-256:218E0B0C02C620819688CA35F8A0A43A10B1424BE922FF80F26A6666976977ED
                  SHA-512:5965CC1C9BED17338D274BAECC6282F7B4687223B4F79B5944EDCE537AFB81F4C386FCB79665B2AEC9D358A486511E67263F30AD14604150AE5D39D24DF6DE1B
                  Malicious:false
                  Reputation:low
                  Preview:regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.......................................................................................................................................................................................................................................................................................................................................................DHvLE.^......Y..............r|..z];..u.vr.........0................... ..hbin................p.\..,..........nk,.Pe...................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .Pe.......... ........................... .......Z.......................Root........lf......Root....nk .Pe.......................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.393740189625997
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:qpwx2wT5ky.exe
                  File size:1128960
                  MD5:c22c0fdbc19dcd4838709bbaca921f56
                  SHA1:4cd9280315ce4ff97cdb95d7dd6d8fcb7715f292
                  SHA256:d72ff8708ffeb9a95f559828938dc1439884e7c224579127418e285b1aa1d235
                  SHA512:207be844380090fdb580bf006dab730643abd4b5a1fafd6d847a2f0831b412294d303399dd23baaf60b47660f326633544fd31ac893acd697bb531767e085943
                  SSDEEP:24576:MeMhSdxLmSbEoA7El4dwcfrQRqXRJ6XjH:MeMhSdxL2oAfd3rRXRJ6TH
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......S..............0..1...........Q... ...`....@.. ...............................x....@................................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x51519f
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x53871FEE [Thu May 29 11:54:22 2014 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:v4.0.30319
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1150840x4a.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1160000x3d4.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x1150ce0x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x1131a50x113200False0.837859566674data7.39943250791IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rsrc0x1160000x3d40x400False0.392578125data3.09213613055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x1180000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_VERSION0x1160580x37cdata
                  DLLImport
                  mscoree.dll_CorExeMain
                  DescriptionData
                  Translation0x0000 0x04b0
                  LegalCopyrightCopyright 2017
                  Assembly Version1.0.0.0
                  InternalNameHospital_project.exe
                  FileVersion1.0.0.0
                  CompanyName
                  LegalTrademarks
                  Comments
                  ProductNameWindowsFormsApplication1
                  ProductVersion1.0.0.0
                  FileDescriptionWindowsFormsApplication1
                  OriginalFilenameHospital_project.exe
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  01/29/22-00:12:35.293104TCP2034960ET TROJAN Win32.Raccoon Stealer Checkin M68049814194.180.174.147192.168.2.3
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 29, 2022 00:11:23.264348030 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:23.294958115 CET8049742188.166.1.115192.168.2.3
                  Jan 29, 2022 00:11:23.295171022 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:23.297174931 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:23.325984955 CET8049742188.166.1.115192.168.2.3
                  Jan 29, 2022 00:11:55.059446096 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.220033884 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.250454903 CET8049745188.166.1.115192.168.2.3
                  Jan 29, 2022 00:11:55.253822088 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.254281998 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.283435106 CET8049745188.166.1.115192.168.2.3
                  Jan 29, 2022 00:12:27.063874006 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:12:27.067521095 CET4978980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:30.077579975 CET4978980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:31.222625017 CET4979980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:34.218528032 CET4979980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:35.065468073 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.113210917 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.115226030 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.115562916 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.163053036 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293103933 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293160915 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293205023 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293241978 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293246031 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.293272018 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293308020 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.298744917 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.328320026 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.328432083 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.328999996 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.329063892 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.343663931 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.358330965 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.358364105 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.528899908 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.578156948 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:53.544519901 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:53.544562101 CET4981580192.168.2.3159.223.25.220
                  • 188.166.1.115
                  • 194.180.174.147
                  • 159.223.25.220
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.349742188.166.1.11580C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:11:23.297174931 CET823OUTGET /hdm3prapor HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Host: 188.166.1.115


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.349745188.166.1.11580C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:11:55.254281998 CET846OUTGET /hdm3prapor HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Host: 188.166.1.115


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.349814194.180.174.14780C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:12:35.115562916 CET9750OUTGET /hdm3prapor HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Host: 194.180.174.147
                  Jan 29, 2022 00:12:35.293103933 CET9752INHTTP/1.1 200 OK
                  Server: nginx
                  Date: Fri, 28 Jan 2022 23:12:35 GMT
                  Content-Type: text/html; charset=utf-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Set-Cookie: stel_ssid=211f13d22189c86382_14521355821524036754; expires=Sat, 29 Jan 2022 23:12:35 GMT; path=/; samesite=None; secure; HttpOnly
                  Pragma: no-cache
                  Cache-control: no-store
                  Strict-Transport-Security: max-age=35768000
                  Access-Control-Allow-Origin: *
                  Data Raw: 31 31 39 65 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 68 64 6d 33 70 72 61 70 6f 72 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 74 65 6c 65 67 72 61 6d 2e 6f 72 67 2f 69 6d 67 2f 74 5f 6c 6f 67 6f 2e 70 6e 67 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 54 65 6c 65 67 72 61 6d 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 61 31 39 32 31 59 6c 63 35 6d 45 56 36 36 66 4b 61 66 79 61 6a 66 35 56 2b 38 30 55 56 38 74 4e 56 76 41 3d 3d 33 64 2d 76 33 35 22 3e 0a 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 74 65 6c 65 67 72 61 6d 2e 6f 72 67 2f 69 6d 67 2f 74 5f 6c 6f 67 6f 2e 70 6e 67 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 54 65 6c 65 67 72 61 6d 22 3e 0a 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 69 6f 73 3a 61 70 70 5f 73 74 6f 72 65 5f 69 64 22 20 63 6f 6e 74 65 6e 74 3d 22 36 38 36 34 34 39 38 30 37 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 69 6f 73 3a 61 70 70 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 54 65 6c 65 67 72 61 6d 20 4d 65 73 73 65 6e 67 65 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 69 6f 73 3a 75 72 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 74 67 3a 2f 2f 72 65 73 6f 6c 76 65 3f 64 6f 6d 61 69 6e 3d 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 61 6e 64 72 6f 69 64 3a 75 72 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 74 67 3a 2f 2f 72 65 73 6f 6c 76 65 3f 64 6f 6d 61 69 6e 3d 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70
                  Data Ascii: 119e<!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @hdm3prapor</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta property="og:title" content="hdm3prapor"><meta property="og:image" content="https://telegram.org/img/t_logo.png"><meta property="og:site_name" content="Telegram"><meta property="og:description" content="a1921Ylc5mEV66fKafyajf5V+80UV8tNVvA==3d-v35"><meta property="twitter:title" content="hdm3prapor"><meta property="twitter:image" content="https://telegram.org/img/t_logo.png"><meta property="twitter:site" content="@Telegram"><meta property="al:ios:app_store_id" content="686449807"><meta property="al:ios:app_name" content="Telegram Messenger"><meta property="al:ios:url" content="tg://resolve?domain=hdm3prapor"><meta property="al:android:url" content="tg://resolve?domain=hdm3prapor"><meta prop


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.349815159.223.25.22080C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:12:35.328999996 CET9756OUTPOST / HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Content-Length: 128
                  Host: 159.223.25.220
                  Jan 29, 2022 00:12:35.528899908 CET9757INHTTP/1.1 404 Not Found
                  Server: nginx
                  Date: Fri, 28 Jan 2022 23:12:35 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Vary: Accept-Encoding
                  Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: a2<html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                  Click to jump to process

                  Target ID:0
                  Start time:00:12:08
                  Start date:29/01/2022
                  Path:C:\Users\user\Desktop\qpwx2wT5ky.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\qpwx2wT5ky.exe"
                  Imagebase:0xd10000
                  File size:1128960 bytes
                  MD5 hash:C22C0FDBC19DCD4838709BBACA921F56
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_DisableWinDefender, Description: Detects executables containing artifcats associated with disabling Widnows Defender, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD, Description: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via IExecuteCommand COM object, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste, Description: Detects executables potentially checking for WinJail sandbox window, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  Target ID:2
                  Start time:00:12:13
                  Start date:29/01/2022
                  Path:C:\Windows\SysWOW64\LaunchWinApp.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\LaunchWinApp.exe
                  Imagebase:0xa0000
                  File size:33280 bytes
                  MD5 hash:529B7E6E938EA6C3BCA2821EB525BBD7
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low

                  Target ID:16
                  Start time:00:13:29
                  Start date:29/01/2022
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796
                  Imagebase:0x160000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly