Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f5OhlYjA9Q.exe

Overview

General Information

Sample Name:f5OhlYjA9Q.exe
Analysis ID:679408
MD5:0c9df96101af0ac8049408831d42dedd
SHA1:a43aedc5578add2f07269f88b923536b9d239019
SHA256:9207a09821cbdc73ff5c3909c74914e772a4c356cfcb58eea38f8eeb1ea0c11a
Tags:exeLimeRATRAT
Infos:

Detection

LimeRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected LimeRAT
Snort IDS alert for network traffic
Protects its processes via BreakOnTermination flag
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

  • System is w10x64
  • f5OhlYjA9Q.exe (PID: 5984 cmdline: "C:\Users\user\Desktop\f5OhlYjA9Q.exe" MD5: 0C9DF96101AF0AC8049408831D42DEDD)
  • cleanup
{"C2 url": "https://pastebin.com/raw/9uk330hR", "AES Key": "O", "ENDOF": "|'N'|", "Seprator": "|'L'|", "Install File": "False", "Install Dir": "temp", "Version": "v4.0"}
SourceRuleDescriptionAuthorStrings
f5OhlYjA9Q.exeJoeSecurity_LimeRATYara detected LimeRATJoe Security
    f5OhlYjA9Q.exeMALWARE_Win_LimeRATLimeRAT payloadditekSHen
    • 0x6892:$s1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr
    • 0x6142:$s2: \vboxhook.dll
    • 0x6552:$s3: Win32_Processor.deviceid="CPU0"
    • 0x6474:$s4: select CommandLine from Win32_Process where Name='{0}'
    • 0x6530:$s5: Minning...
    • 0x64e2:$s6: Regasm.exe
    • 0x6815:$s7: Flood!
    • 0x6374:$s8: Rans-Status
    f5OhlYjA9Q.exeWindows_Trojan_Limerat_24269a79unknownunknown
    • 0x6892:$a1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LimeRATYara detected LimeRATJoe Security
      00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Limerat_24269a79unknownunknown
      • 0x6692:$a1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
      Process Memory Space: f5OhlYjA9Q.exe PID: 5984JoeSecurity_LimeRATYara detected LimeRATJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.f5OhlYjA9Q.exe.1d0000.0.unpackJoeSecurity_LimeRATYara detected LimeRATJoe Security
          0.0.f5OhlYjA9Q.exe.1d0000.0.unpackMALWARE_Win_LimeRATLimeRAT payloadditekSHen
          • 0x6892:$s1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr
          • 0x6142:$s2: \vboxhook.dll
          • 0x6552:$s3: Win32_Processor.deviceid="CPU0"
          • 0x6474:$s4: select CommandLine from Win32_Process where Name='{0}'
          • 0x6530:$s5: Minning...
          • 0x64e2:$s6: Regasm.exe
          • 0x6815:$s7: Flood!
          • 0x6374:$s8: Rans-Status
          0.0.f5OhlYjA9Q.exe.1d0000.0.unpackWindows_Trojan_Limerat_24269a79unknownunknown
          • 0x6892:$a1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
          No Sigma rule has matched
          Timestamp:192.168.2.5102.133.180.234976655522832296 08/05/22-18:07:22.413967
          SID:2832296
          Source Port:49766
          Destination Port:5552
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: f5OhlYjA9Q.exeVirustotal: Detection: 66%Perma Link
          Source: f5OhlYjA9Q.exeMetadefender: Detection: 65%Perma Link
          Source: f5OhlYjA9Q.exeReversingLabs: Detection: 96%
          Source: f5OhlYjA9Q.exeAvira: detected
          Source: f5OhlYjA9Q.exeJoe Sandbox ML: detected
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpackMalware Configuration Extractor: LimeRAT {"C2 url": "https://pastebin.com/raw/9uk330hR", "AES Key": "O", "ENDOF": "|'N'|", "Seprator": "|'L'|", "Install File": "False", "Install Dir": "temp", "Version": "v4.0"}
          Source: f5OhlYjA9Q.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.34.170:443 -> 192.168.2.5:49764 version: TLS 1.0
          Source: f5OhlYjA9Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2832296 ETPRO TROJAN njRAT/Bladabindi/LimeRAT Variant CnC Checkin 192.168.2.5:49766 -> 102.133.180.23:5552
          Source: Malware configuration extractorURLs: https://pastebin.com/raw/9uk330hR
          Source: unknownDNS query: name: pastebin.com
          Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: global trafficHTTP traffic detected: GET /raw/9uk330hR HTTP/1.1Host: pastebin.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 172.67.34.170 172.67.34.170
          Source: unknownHTTPS traffic detected: 172.67.34.170:443 -> 192.168.2.5:49764 version: TLS 1.0
          Source: global trafficTCP traffic: 192.168.2.5:49766 -> 102.133.180.23:5552
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: f5OhlYjA9Q.exe, 00000000.00000002.677396151.0000000002511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: unknownDNS traffic detected: queries for: pastebin.com
          Source: global trafficHTTP traffic detected: GET /raw/9uk330hR HTTP/1.1Host: pastebin.comConnection: Keep-Alive

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR

          Operating System Destruction

          barindex
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: 01 00 00 00 Jump to behavior

          System Summary

          barindex
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: LimeRAT payload Author: ditekSHen
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: Windows_Trojan_Limerat_24269a79 Author: unknown
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: LimeRAT payload Author: ditekSHen
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Limerat_24269a79 Author: unknown
          Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Limerat_24269a79 Author: unknown
          Source: f5OhlYjA9Q.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: MALWARE_Win_LimeRAT author = ditekSHen, description = LimeRAT payload
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: Windows_Trojan_Limerat_24269a79 reference_sample = ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01, os = windows, severity = x86, creation_date = 2021-08-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Limerat, fingerprint = cb714cd787519216d25edaad9f89a9c0ce1b8fbbbcdf90bda4c79f5d85fdf381, id = 24269a79-0172-4da5-9b4d-f61327072bf0, last_modified = 2021-10-04
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_LimeRAT author = ditekSHen, description = LimeRAT payload
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Limerat_24269a79 reference_sample = ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01, os = windows, severity = x86, creation_date = 2021-08-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Limerat, fingerprint = cb714cd787519216d25edaad9f89a9c0ce1b8fbbbcdf90bda4c79f5d85fdf381, id = 24269a79-0172-4da5-9b4d-f61327072bf0, last_modified = 2021-10-04
          Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Limerat_24269a79 reference_sample = ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01, os = windows, severity = x86, creation_date = 2021-08-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Limerat, fingerprint = cb714cd787519216d25edaad9f89a9c0ce1b8fbbbcdf90bda4c79f5d85fdf381, id = 24269a79-0172-4da5-9b4d-f61327072bf0, last_modified = 2021-10-04
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6D0E80_2_00B6D0E8
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6B1300_2_00B6B130
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6A5180_2_00B6A518
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6A8600_2_00B6A860
          Source: f5OhlYjA9Q.exeVirustotal: Detection: 66%
          Source: f5OhlYjA9Q.exeMetadefender: Detection: 65%
          Source: f5OhlYjA9Q.exeReversingLabs: Detection: 96%
          Source: f5OhlYjA9Q.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeFile created: C:\Users\user\AppData\Local\Temp\tmp970.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ???????????/????????????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ???????????/????????????.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: f5OhlYjA9Q.exe, ???????????/????????????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: f5OhlYjA9Q.exe, ???????????/????????????.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: f5OhlYjA9Q.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: f5OhlYjA9Q.exe, ??????????/?????.csBase64 encoded string: 'U3lzdGVtXEN1cnJlbnRDb250cm9sU2V0XFNlcnZpY2VzXERpc2tcRW51bVw='
          Source: f5OhlYjA9Q.exe, ??????/?????????????.csBase64 encoded string: 'reC3Gq506tzRlGkwD9d6lQXTo/GMJOJVas2CFdWoGpF+hwEOMHoVQ5hsQpsLNMV9'
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ??????????/?????.csBase64 encoded string: 'U3lzdGVtXEN1cnJlbnRDb250cm9sU2V0XFNlcnZpY2VzXERpc2tcRW51bVw='
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ??????/?????????????.csBase64 encoded string: 'reC3Gq506tzRlGkwD9d6lQXTo/GMJOJVas2CFdWoGpF+hwEOMHoVQ5hsQpsLNMV9'
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeMutant created: \Sessions\1\BaseNamedObjects\B1B32F58AD76
          Source: f5OhlYjA9Q.exe, ?????/???????.csCryptographic APIs: 'TransformFinalBlock'
          Source: f5OhlYjA9Q.exe, ?????/???????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ?????/???????.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ?????/???????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: f5OhlYjA9Q.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: f5OhlYjA9Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: f5OhlYjA9Q.exe, ?????/?????.cs.Net Code: ???????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ?????/?????.cs.Net Code: ???????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B623D0 push eax; retf 0_2_00B623D9
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B62FEC push eax; retf 0_2_00B62FF5

          Boot Survival

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR
          Source: f5OhlYjA9Q.exeBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exe TID: 3376Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWindow / User API: threadDelayed 9650Jump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: f5OhlYjA9Q.exe, 00000000.00000002.676796293.00000000007BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5 2.40 GHz
          Source: f5OhlYjA9Q.exe, 00000000.00000002.681970901.000000000617A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5P
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5!p
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5R
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5Y
          Source: f5OhlYjA9Q.exe, 00000000.00000003.644413544.00000000066D6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET516LMEMp
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoContro
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5]
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5_
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5#
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523757903.000000000616B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5ReqLMEMp
          Source: f5OhlYjA9Q.exeBinary or memory string: \vboxhook.dllQY21kLmV4ZSAvYyBwaW5nIDAgLW4gMiAmIGRlbCA=
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5%
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5d
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5-
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5,
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523057323.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET53
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5w
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5|1?#
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5mberControlled
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET58
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682732698.0000000006707000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5BIOSLMEMp
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5|
          Source: f5OhlYjA9Q.exe, 00000000.00000003.643548521.00000000066B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer128
          Source: f5OhlYjA9Q.exe, 00000000.00000003.644437550.00000000066DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5@
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523057323.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5vr
          Source: f5OhlYjA9Q.exeBinary or memory string: vmwareqemu
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5F
          Source: f5OhlYjA9Q.exe, 00000000.00000002.681970901.000000000617A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5LMEMp
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5|1
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5<p
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5J
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5O
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Users\user\Desktop\f5OhlYjA9Q.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522857543.00000000060F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts121
          Windows Management Instrumentation
          Path InterceptionPath Interception1
          Disable or Modify Tools
          OS Credential Dumping1
          Query Registry
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Web Service
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
          Virtualization/Sandbox Evasion
          LSASS Memory131
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Non-Standard Port
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Obfuscated Files or Information
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Ingress Tool Transfer
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingData Transfer Size Limits2
          Non-Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
          Remote System Discovery
          VNCGUI Input CaptureExfiltration Over C2 Channel13
          Application Layer Protocol
          Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync113
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          f5OhlYjA9Q.exe66%VirustotalBrowse
          f5OhlYjA9Q.exe66%MetadefenderBrowse
          f5OhlYjA9Q.exe96%ReversingLabsByteCode-MSIL.Backdoor.LimeRAT
          f5OhlYjA9Q.exe100%AviraTR/Spy.Gen8
          f5OhlYjA9Q.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          0.0.f5OhlYjA9Q.exe.1d0000.0.unpack100%AviraHEUR/AGEN.1208284Download File
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          pastebin.com
          172.67.34.170
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://pastebin.com/raw/9uk330hRfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namef5OhlYjA9Q.exe, 00000000.00000002.677396151.0000000002511000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                172.67.34.170
                pastebin.comUnited States
                13335CLOUDFLARENETUSfalse
                102.133.180.23
                unknownSouth Africa
                8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679408
                Start date and time: 05/08/202218:06:112022-08-05 18:06:11 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 54s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:f5OhlYjA9Q.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:21
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/0@1/2
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 10
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, licensing.mp.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                18:07:19API Interceptor1x Sleep call for process: f5OhlYjA9Q.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                172.67.34.170ovVFbnqzTY.exeGet hashmaliciousBrowse
                • pastebin.com/raw/ubFNTPjt
                102.133.180.23aYkk4iwpbX.exeGet hashmaliciousBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  pastebin.comaYkk4iwpbX.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  ________.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  PX8kUhlKWu.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  IcBPQkNxxP.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  G6kPQfnG8s.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  P7Epw5tRFF.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  RbMOGd6U5O.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  RbMOGd6U5O.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  bDTn.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  bDQd.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  bDQe.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  5E440E04F382464DB10245C9F730D64D839368EF763BB.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  qhppTNy7DA.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  HFqXwq7578.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  bDJ8.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  Wire Transfer.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  install.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  7L6p5qThyj.exeGet hashmaliciousBrowse
                  • 104.20.68.143
                  3spBsuAPuH.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  CLOUDFLARENETUShttps://app.pandadoc.com/p/add946e9108ca11a5398366b7c1a9201821b4a33?Get hashmaliciousBrowse
                  • 104.19.154.83
                  https://www.canva.com/design/DAFIXFyzl04/q7_AQknnKKsVBm8577eclA/view?utm_content=DAFIXFyzl04&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelinkGet hashmaliciousBrowse
                  • 104.16.123.96
                  https://keyah.demenc.click/?ref=72bWFyay5wYWxtaWVyaUBhcnJheXRlY2hpbmMuY29tGet hashmaliciousBrowse
                  • 104.16.244.78
                  https://adclick.g.doubleclick.net/pcs/click?adurl=https://550418.secure.micomya.com/./outlook.office.com/mail/inbox/id/thall/op-f/77468616c6c406f702d662e6f7267#dGhhbGxAb3AtZi5vcmcGet hashmaliciousBrowse
                  • 104.26.4.30
                  https://my.upflowy.com/v8tf-faxlandingsatsteelecreekGet hashmaliciousBrowse
                  • 104.17.24.14
                  Remittance_ACH_20220630.HTMLGet hashmaliciousBrowse
                  • 104.17.25.14
                  https://my.upflowy.com/v8tf-faxlandingsatsteelecreekGet hashmaliciousBrowse
                  • 104.17.24.14
                  llTrlJSa8c.exeGet hashmaliciousBrowse
                  • 188.114.96.3
                  asim5528 BACS Remittance Advise.htaGet hashmaliciousBrowse
                  • 104.17.24.14
                  https://denisaolldashi.clickfunnels.com/auto-webinar-registration1659690849768Get hashmaliciousBrowse
                  • 104.17.25.14
                  https://denisaolldashi.clickfunnels.com/auto-webinar-registration1659690849768Get hashmaliciousBrowse
                  • 104.17.25.14
                  Revised shipment.pdf.exeGet hashmaliciousBrowse
                  • 104.18.115.97
                  aYkk4iwpbX.exeGet hashmaliciousBrowse
                  • 104.20.67.143
                  Contract - Wipak Oy.xlsxGet hashmaliciousBrowse
                  • 162.159.129.233
                  3WdlXj8suM.exeGet hashmaliciousBrowse
                  • 104.18.115.97
                  3CzQDO1WLI.exeGet hashmaliciousBrowse
                  • 162.159.133.233
                  http://aftral.comrgkxeaj7rpiqoyj25vnt-rgkxeaj7rpiqoyj25vnt.waurwors.com/pwd.php#anVsaWVuLmh1YmVyZGVhdUBhZnRyYWwuY29tGet hashmaliciousBrowse
                  • 104.17.25.14
                  DT5a7gQIfc.exeGet hashmaliciousBrowse
                  • 188.114.96.3
                  Lg3gn9y1Cj.exeGet hashmaliciousBrowse
                  • 104.18.114.97
                  MICROSOFT-CORP-MSN-AS-BLOCKUShttps://app.pandadoc.com/p/add946e9108ca11a5398366b7c1a9201821b4a33?Get hashmaliciousBrowse
                  • 204.79.197.200
                  Remittance_ACH_20220630.HTMLGet hashmaliciousBrowse
                  • 13.107.219.45
                  s6hqPILNT8.exeGet hashmaliciousBrowse
                  • 51.141.184.179
                  #Ud83c#Udfb6 voice121_076_454656_4-2(6).hTmLGet hashmaliciousBrowse
                  • 13.107.219.60
                  qzUm7aiIniGet hashmaliciousBrowse
                  • 51.110.15.175
                  Smqw34mNlmGet hashmaliciousBrowse
                  • 40.102.64.11
                  DaRy29DIvVGet hashmaliciousBrowse
                  • 143.80.220.174
                  VefqQeU0XtGet hashmaliciousBrowse
                  • 22.216.57.76
                  xUpRBKliT8Get hashmaliciousBrowse
                  • 21.184.128.42
                  mWyPrcv7Pl.exeGet hashmaliciousBrowse
                  • 13.107.43.12
                  E3ftUykd1O.exeGet hashmaliciousBrowse
                  • 13.107.43.13
                  f1M2XRyWg0.exeGet hashmaliciousBrowse
                  • 13.107.43.12
                  Uyljxgntczjzqsjbfhyebvyzaflytpubrw.exeGet hashmaliciousBrowse
                  • 13.107.43.12
                  g6eZdl6puZ.exeGet hashmaliciousBrowse
                  • 13.107.43.13
                  aYkk4iwpbX.exeGet hashmaliciousBrowse
                  • 102.133.180.23
                  VoRTaSs6hl.exeGet hashmaliciousBrowse
                  • 13.107.43.12
                  JOB-in.line e.K. - New Order 56899707.exeGet hashmaliciousBrowse
                  • 20.91.187.223
                  http://aftral.comrgkxeaj7rpiqoyj25vnt-rgkxeaj7rpiqoyj25vnt.waurwors.com/pwd.php#anVsaWVuLmh1YmVyZGVhdUBhZnRyYWwuY29tGet hashmaliciousBrowse
                  • 20.190.160.20
                  TgwUjEDwgtGet hashmaliciousBrowse
                  • 20.59.113.74
                  hOP0tFKwjiGet hashmaliciousBrowse
                  • 20.192.254.56
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  54328bd36c14bd82ddaa0c04b25ed9adllTrlJSa8c.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  aYkk4iwpbX.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  quotation docx lnk.lnkGet hashmaliciousBrowse
                  • 172.67.34.170
                  U6E6Dol8KH.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  ________.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  92.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  62.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  ERXP-30938765367389-309837657.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  bDTn.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  z0LAuQETev.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  NHPUWUJUFDLFFTSGRWJKA.VBSGet hashmaliciousBrowse
                  • 172.67.34.170
                  HWQYKIYQXULHHADVTCBZV.VBSGet hashmaliciousBrowse
                  • 172.67.34.170
                  6@6J@.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  6inch #U5165#U672dBidding 20 systems List No.1 220526.lnkGet hashmaliciousBrowse
                  • 172.67.34.170
                  usps547325611.vbsGet hashmaliciousBrowse
                  • 172.67.34.170
                  869BBYTD.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  U48uolUdhu.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  Recepit.htmlGet hashmaliciousBrowse
                  • 172.67.34.170
                  SecuriteInfo.com.W32.AIDetectNet.01.32686.exeGet hashmaliciousBrowse
                  • 172.67.34.170
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.933706659390986
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                  File name:f5OhlYjA9Q.exe
                  File size:29696
                  MD5:0c9df96101af0ac8049408831d42dedd
                  SHA1:a43aedc5578add2f07269f88b923536b9d239019
                  SHA256:9207a09821cbdc73ff5c3909c74914e772a4c356cfcb58eea38f8eeb1ea0c11a
                  SHA512:2079380e4b839ba4b46f8f7c9eb34dc85b33a2876faa968efed62c3eb544125395ad6fc0dbf29f627cbf47e4550366485f2e789545a3726dd12df0a7cbb6710b
                  SSDEEP:768:rtFHGfbAqYxDeGRey0195mbUjlaMOVUUrjy:ppGTAqYxDeGRe9a+laZj
                  TLSH:B0D27D4C77D16368C2DD5AB54BB1606B0DB15A079A3BDB1F0CC864D71B3BACA8741BE0
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b.................p............... ........@.. ....................................@................................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x408e8e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x62E6C7E4 [Sun Jul 31 18:20:20 2022 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8e380x53.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x6e940x7000False0.49428013392857145data6.048898258700505IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .reloc0xa0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  192.168.2.5102.133.180.234976655522832296 08/05/22-18:07:22.413967TCP2832296ETPRO TROJAN njRAT/Bladabindi/LimeRAT Variant CnC Checkin497665552192.168.2.5102.133.180.23
                  TimestampSource PortDest PortSource IPDest IP
                  Aug 5, 2022 18:07:20.818314075 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:20.818363905 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:20.818469048 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:20.848674059 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:20.848714113 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:20.906599045 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:20.906697035 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:20.910625935 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:20.910633087 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:20.910878897 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:21.105572939 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:21.393193960 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:21.435477972 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:21.657042980 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:21.657130957 CEST44349764172.67.34.170192.168.2.5
                  Aug 5, 2022 18:07:21.657222986 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:21.661662102 CEST49764443192.168.2.5172.67.34.170
                  Aug 5, 2022 18:07:21.733239889 CEST497665552192.168.2.5102.133.180.23
                  Aug 5, 2022 18:07:21.920842886 CEST555249766102.133.180.23192.168.2.5
                  Aug 5, 2022 18:07:21.920969963 CEST497665552192.168.2.5102.133.180.23
                  Aug 5, 2022 18:07:22.413966894 CEST497665552192.168.2.5102.133.180.23
                  Aug 5, 2022 18:07:22.654601097 CEST555249766102.133.180.23192.168.2.5
                  Aug 5, 2022 18:07:28.179147959 CEST497665552192.168.2.5102.133.180.23
                  Aug 5, 2022 18:07:28.423839092 CEST555249766102.133.180.23192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Aug 5, 2022 18:07:20.763665915 CEST5966153192.168.2.58.8.8.8
                  Aug 5, 2022 18:07:20.783689976 CEST53596618.8.8.8192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Aug 5, 2022 18:07:20.763665915 CEST192.168.2.58.8.8.80xa3ddStandard query (0)pastebin.comA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Aug 5, 2022 18:07:20.783689976 CEST8.8.8.8192.168.2.50xa3ddNo error (0)pastebin.com172.67.34.170A (IP address)IN (0x0001)
                  Aug 5, 2022 18:07:20.783689976 CEST8.8.8.8192.168.2.50xa3ddNo error (0)pastebin.com104.20.68.143A (IP address)IN (0x0001)
                  Aug 5, 2022 18:07:20.783689976 CEST8.8.8.8192.168.2.50xa3ddNo error (0)pastebin.com104.20.67.143A (IP address)IN (0x0001)
                  • pastebin.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.549764172.67.34.170443C:\Users\user\Desktop\f5OhlYjA9Q.exe
                  TimestampkBytes transferredDirectionData
                  2022-08-05 16:07:21 UTC0OUTGET /raw/9uk330hR HTTP/1.1
                  Host: pastebin.com
                  Connection: Keep-Alive
                  2022-08-05 16:07:21 UTC0INHTTP/1.1 200 OK
                  Date: Fri, 05 Aug 2022 16:07:21 GMT
                  Content-Type: text/plain; charset=utf-8
                  Transfer-Encoding: chunked
                  Connection: close
                  x-frame-options: DENY
                  x-content-type-options: nosniff
                  x-xss-protection: 1;mode=block
                  cache-control: public, max-age=1801
                  CF-Cache-Status: EXPIRED
                  Last-Modified: Fri, 05 Aug 2022 10:14:18 GMT
                  Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
                  Server: cloudflare
                  CF-RAY: 7360c906be0d909d-FRA
                  2022-08-05 16:07:21 UTC0INData Raw: 31 33 0d 0a 31 30 32 2e 31 33 33 2e 31 38 30 2e 32 33 3a 35 35 35 32 0d 0a
                  Data Ascii: 13102.133.180.23:5552
                  2022-08-05 16:07:21 UTC0INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:18:07:14
                  Start date:05/08/2022
                  Path:C:\Users\user\Desktop\f5OhlYjA9Q.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\f5OhlYjA9Q.exe"
                  Imagebase:0x1d0000
                  File size:29696 bytes
                  MD5 hash:0C9DF96101AF0AC8049408831D42DEDD
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_LimeRAT, Description: Yara detected LimeRAT, Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Limerat_24269a79, Description: unknown, Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                  Reputation:low

                  Reset < >

                    Execution Graph

                    Execution Coverage:17.4%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:7
                    Total number of Limit Nodes:0
                    execution_graph 11904 b66250 11905 b6626e 11904->11905 11908 b64014 11905->11908 11907 b662a5 11910 b67d70 11908->11910 11909 b67e2a LoadLibraryA 11911 b67e69 11909->11911 11910->11909 11910->11910

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 157 b6d0e8-b6d113 158 b6d345-b6d36d 157->158 159 b6d119-b6d120 157->159 174 b6d374-b6d384 158->174 160 b6d122-b6d12b 159->160 161 b6d12c-b6d14b 159->161 163 b6d151-b6d172 161->163 164 b6d338-b6d344 161->164 165 b6d174-b6d178 163->165 166 b6d17a-b6d1a8 163->166 165->166 167 b6d1aa 165->167 170 b6d1ad-b6d233 call b6bb10 166->170 167->170 229 b6d235 call b6d4d2 170->229 230 b6d235 call b6d390 170->230 231 b6d235 call b6d0e8 170->231 177 b6d386-b6d3e9 174->177 178 b6d3ee-b6d48c 174->178 177->178 193 b6d495-b6d4e0 178->193 194 b6d48e-b6d494 178->194 186 b6d23b-b6d249 call b6c2a8 191 b6d24b-b6d24d 186->191 192 b6d2a8-b6d2ac 186->192 197 b6d291-b6d2a0 191->197 195 b6d2ae-b6d2bb 192->195 196 b6d2ef-b6d2f6 192->196 218 b6d4e2 193->218 219 b6d4ea-b6d4ee 193->219 194->193 199 b6d2cf-b6d2e1 195->199 200 b6d2bd-b6d2c2 195->200 202 b6d30a-b6d30e 196->202 203 b6d2f8-b6d2ff 196->203 197->192 204 b6d2a2 197->204 207 b6d330-b6d335 199->207 217 b6d2e3-b6d2ed 199->217 200->199 209 b6d2c4-b6d2cd 200->209 202->207 208 b6d310-b6d317 202->208 203->202 210 b6d301 203->210 205 b6d2a4-b6d2a6 204->205 206 b6d24f-b6d25b 204->206 205->192 205->206 206->174 213 b6d261-b6d290 206->213 207->164 208->207 211 b6d319-b6d32f 208->211 209->207 210->202 213->197 217->207 218->219 221 b6d4f0-b6d4fc 219->221 222 b6d50a 219->222 224 b6d504 221->224 225 b6d4fe-b6d501 221->225 227 b6d50b 222->227 224->222 225->224 227->227 229->186 230->186 231->186
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.677221473.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b60000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID: <Ul
                    • API String ID: 0-802154676
                    • Opcode ID: 5c9de3ebeb6edd52d2c9e92a1dc19da994cbeefd67479958f5d91fe550f1e94b
                    • Instruction ID: 79646199ab89e5efc4abca3745999b64081977e816b8d16025faea1a5d325ed3
                    • Opcode Fuzzy Hash: 5c9de3ebeb6edd52d2c9e92a1dc19da994cbeefd67479958f5d91fe550f1e94b
                    • Instruction Fuzzy Hash: 0CD16D71E002098FCB14DFA8C484AAEBBF2FF88314F15855AE915AB351CB34ED46CB91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677221473.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b60000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fd1ff1df5ebe8532598c86f4ba48fed0fba3577675cc47d19a8f06109e9e6edc
                    • Instruction ID: 4827f506dcd711dcd5c982e340333e497e9e2678f9dc7130a3b00de7ca9b5b3d
                    • Opcode Fuzzy Hash: fd1ff1df5ebe8532598c86f4ba48fed0fba3577675cc47d19a8f06109e9e6edc
                    • Instruction Fuzzy Hash: A6B10770E002098FDF14CFA9C9857AEBBF2EF88754F148169D815B7294DB789846CF92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677221473.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b60000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b31e55700bba27e7b687a3f09028feef1e30221ca6fb2a0d2c1647fbb3da9602
                    • Instruction ID: 5a9216a72bb21b427489f711f4cf9c407ae1f2dadf45b75c17a77006987f9a7f
                    • Opcode Fuzzy Hash: b31e55700bba27e7b687a3f09028feef1e30221ca6fb2a0d2c1647fbb3da9602
                    • Instruction Fuzzy Hash: FBB14B71E002098FDB14CFA9D895BEEBBF2EF88314F148169D815E7394DB789885CB81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677221473.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b60000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5db5f659beba0f7ed1ac7435edf97bffa9cac8b0b5bffa7e689cdaec708c5cc0
                    • Instruction ID: f30cb0481851afe8c200f08ff030b4178a781b683e02d8b72db33477d42b61fb
                    • Opcode Fuzzy Hash: 5db5f659beba0f7ed1ac7435edf97bffa9cac8b0b5bffa7e689cdaec708c5cc0
                    • Instruction Fuzzy Hash: 9C910670E002098FDF14CFA9C9857EEBAF2EF88714F148169E415B7294DB789846CF92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 118 b67d64-b67dc7 119 b67e1b-b67e67 LoadLibraryA 118->119 120 b67dc9-b67dee 118->120 123 b67e70-b67ea1 119->123 124 b67e69-b67e6f 119->124 120->119 125 b67df0-b67df2 120->125 130 b67ea3-b67ea7 123->130 131 b67eb1 123->131 124->123 127 b67df4-b67dfe 125->127 128 b67e15-b67e18 125->128 132 b67e02-b67e11 127->132 133 b67e00 127->133 128->119 130->131 135 b67ea9 130->135 136 b67eb2 131->136 132->132 134 b67e13 132->134 133->132 134->128 135->131 136->136
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.677221473.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b60000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 4664f9e742d3a2638b306a6d83136fc14098599ff23ab8f2e64325811918f20f
                    • Instruction ID: f1f4d1f45ed9c4bf6e66fb2602cb50702538633e352fc9f50b6edbfdbd423c16
                    • Opcode Fuzzy Hash: 4664f9e742d3a2638b306a6d83136fc14098599ff23ab8f2e64325811918f20f
                    • Instruction Fuzzy Hash: 6241ABB1D042488FDB10CFA8C8817DEBBF5EB48318F1481A9D805AB380CB79984ACF81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 137 b64014-b67dc7 139 b67e1b-b67e67 LoadLibraryA 137->139 140 b67dc9-b67dee 137->140 143 b67e70-b67ea1 139->143 144 b67e69-b67e6f 139->144 140->139 145 b67df0-b67df2 140->145 150 b67ea3-b67ea7 143->150 151 b67eb1 143->151 144->143 147 b67df4-b67dfe 145->147 148 b67e15-b67e18 145->148 152 b67e02-b67e11 147->152 153 b67e00 147->153 148->139 150->151 155 b67ea9 150->155 156 b67eb2 151->156 152->152 154 b67e13 152->154 153->152 154->148 155->151 156->156
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.677221473.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b60000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 491e84631eab820149bcaae1b61eb6ef4aff17fbd4c824a687da3738aa989e92
                    • Instruction ID: ea98caff8cbb4c34ef1e9fee6ecec7197787d8f296a88c05fb39ffec94000085
                    • Opcode Fuzzy Hash: 491e84631eab820149bcaae1b61eb6ef4aff17fbd4c824a687da3738aa989e92
                    • Instruction Fuzzy Hash: 93417CB1D046188FDB10CFA9C88579EBBF5EB48718F108069D815EB380DB799C49CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677085963.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_a8d000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d07252c471d62b7b5fa0e4e4d09f34f36c37f13147d7903cfeb04cf6918401ba
                    • Instruction ID: 6b9880a58c624ca737b63fb3bf5afb765f1b92e84d851d722fcb95b6f17f9314
                    • Opcode Fuzzy Hash: d07252c471d62b7b5fa0e4e4d09f34f36c37f13147d7903cfeb04cf6918401ba
                    • Instruction Fuzzy Hash: 8D2137B2504244DFCB04EF10D9C0F26BB65FB98324F24867DE9094B29AD336D856CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677127793.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_a9d000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 856800522971aa9be6ddf4d582daf9723d137e76777b9b55a9fd833887326394
                    • Instruction ID: e3e41557d30b8da02fca149ebf82461b1b81b682c9f008eb6b63fb954c51b610
                    • Opcode Fuzzy Hash: 856800522971aa9be6ddf4d582daf9723d137e76777b9b55a9fd833887326394
                    • Instruction Fuzzy Hash: 8B21C5B6604244EFDF04DF10D9C4B26BBA5FB84314F34CA6DD9094B256C736D886CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677085963.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_a8d000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5420d5305238894590119742960248a75d15a15b8639eb191e66ac764d8702b8
                    • Instruction ID: 3f7f731e4f3e81b3b2e55e3bf8a4b1c14f3f64ccaf9b84154702d7151cc7c9af
                    • Opcode Fuzzy Hash: 5420d5305238894590119742960248a75d15a15b8639eb191e66ac764d8702b8
                    • Instruction Fuzzy Hash: 4D11D376804280CFCF15DF10D5C4B16BF71FB94324F2886A9D8450B65AC336D856CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.677127793.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_a9d000_f5OhlYjA9Q.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 50eb2c3a52440a91dc116737e4d910fd79c16869f8b8fc563e5ae3e56bb24798
                    • Instruction ID: 00055059a6c478332e92a04ae29deb3eb6a1c062ca01c181e9ffc65498d3a121
                    • Opcode Fuzzy Hash: 50eb2c3a52440a91dc116737e4d910fd79c16869f8b8fc563e5ae3e56bb24798
                    • Instruction Fuzzy Hash: B4119D76604280DFDB01CF10D9C4B15FBB1FB84324F28C6AED8494B656C33AD88ACBA1
                    Uniqueness

                    Uniqueness Score: -1.00%