Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f5OhlYjA9Q.exe

Overview

General Information

Sample Name:f5OhlYjA9Q.exe
Analysis ID:679408
MD5:0c9df96101af0ac8049408831d42dedd
SHA1:a43aedc5578add2f07269f88b923536b9d239019
SHA256:9207a09821cbdc73ff5c3909c74914e772a4c356cfcb58eea38f8eeb1ea0c11a
Tags:exeLimeRATRAT
Infos:

Detection

LimeRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected LimeRAT
Snort IDS alert for network traffic
Protects its processes via BreakOnTermination flag
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

  • System is w10x64
  • f5OhlYjA9Q.exe (PID: 5984 cmdline: "C:\Users\user\Desktop\f5OhlYjA9Q.exe" MD5: 0C9DF96101AF0AC8049408831D42DEDD)
  • cleanup
{"C2 url": "https://pastebin.com/raw/9uk330hR", "AES Key": "O", "ENDOF": "|'N'|", "Seprator": "|'L'|", "Install File": "False", "Install Dir": "temp", "Version": "v4.0"}
SourceRuleDescriptionAuthorStrings
f5OhlYjA9Q.exeJoeSecurity_LimeRATYara detected LimeRATJoe Security
    f5OhlYjA9Q.exeMALWARE_Win_LimeRATLimeRAT payloadditekSHen
    • 0x6892:$s1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr
    • 0x6142:$s2: \vboxhook.dll
    • 0x6552:$s3: Win32_Processor.deviceid="CPU0"
    • 0x6474:$s4: select CommandLine from Win32_Process where Name='{0}'
    • 0x6530:$s5: Minning...
    • 0x64e2:$s6: Regasm.exe
    • 0x6815:$s7: Flood!
    • 0x6374:$s8: Rans-Status
    f5OhlYjA9Q.exeWindows_Trojan_Limerat_24269a79unknownunknown
    • 0x6892:$a1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LimeRATYara detected LimeRATJoe Security
      00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Limerat_24269a79unknownunknown
      • 0x6692:$a1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
      Process Memory Space: f5OhlYjA9Q.exe PID: 5984JoeSecurity_LimeRATYara detected LimeRATJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.f5OhlYjA9Q.exe.1d0000.0.unpackJoeSecurity_LimeRATYara detected LimeRATJoe Security
          0.0.f5OhlYjA9Q.exe.1d0000.0.unpackMALWARE_Win_LimeRATLimeRAT payloadditekSHen
          • 0x6892:$s1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr
          • 0x6142:$s2: \vboxhook.dll
          • 0x6552:$s3: Win32_Processor.deviceid="CPU0"
          • 0x6474:$s4: select CommandLine from Win32_Process where Name='{0}'
          • 0x6530:$s5: Minning...
          • 0x64e2:$s6: Regasm.exe
          • 0x6815:$s7: Flood!
          • 0x6374:$s8: Rans-Status
          0.0.f5OhlYjA9Q.exe.1d0000.0.unpackWindows_Trojan_Limerat_24269a79unknownunknown
          • 0x6892:$a1: schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
          No Sigma rule has matched
          Timestamp:192.168.2.5102.133.180.234976655522832296 08/05/22-18:07:22.413967
          SID:2832296
          Source Port:49766
          Destination Port:5552
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: f5OhlYjA9Q.exeVirustotal: Detection: 66%Perma Link
          Source: f5OhlYjA9Q.exeMetadefender: Detection: 65%Perma Link
          Source: f5OhlYjA9Q.exeReversingLabs: Detection: 96%
          Source: f5OhlYjA9Q.exeAvira: detected
          Source: f5OhlYjA9Q.exeJoe Sandbox ML: detected
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpackMalware Configuration Extractor: LimeRAT {"C2 url": "https://pastebin.com/raw/9uk330hR", "AES Key": "O", "ENDOF": "|'N'|", "Seprator": "|'L'|", "Install File": "False", "Install Dir": "temp", "Version": "v4.0"}
          Source: f5OhlYjA9Q.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.34.170:443 -> 192.168.2.5:49764 version: TLS 1.0
          Source: f5OhlYjA9Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2832296 ETPRO TROJAN njRAT/Bladabindi/LimeRAT Variant CnC Checkin 192.168.2.5:49766 -> 102.133.180.23:5552
          Source: Malware configuration extractorURLs: https://pastebin.com/raw/9uk330hR
          Source: unknownDNS query: name: pastebin.com
          Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: global trafficHTTP traffic detected: GET /raw/9uk330hR HTTP/1.1Host: pastebin.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 172.67.34.170 172.67.34.170
          Source: unknownHTTPS traffic detected: 172.67.34.170:443 -> 192.168.2.5:49764 version: TLS 1.0
          Source: global trafficTCP traffic: 192.168.2.5:49766 -> 102.133.180.23:5552
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: unknownTCP traffic detected without corresponding DNS query: 102.133.180.23
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: f5OhlYjA9Q.exe, 00000000.00000002.677396151.0000000002511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: unknownDNS traffic detected: queries for: pastebin.com
          Source: global trafficHTTP traffic detected: GET /raw/9uk330hR HTTP/1.1Host: pastebin.comConnection: Keep-Alive

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR

          Operating System Destruction

          barindex
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: 01 00 00 00

          System Summary

          barindex
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: LimeRAT payload Author: ditekSHen
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: Windows_Trojan_Limerat_24269a79 Author: unknown
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: LimeRAT payload Author: ditekSHen
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Limerat_24269a79 Author: unknown
          Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Limerat_24269a79 Author: unknown
          Source: f5OhlYjA9Q.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: MALWARE_Win_LimeRAT author = ditekSHen, description = LimeRAT payload
          Source: f5OhlYjA9Q.exe, type: SAMPLEMatched rule: Windows_Trojan_Limerat_24269a79 reference_sample = ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01, os = windows, severity = x86, creation_date = 2021-08-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Limerat, fingerprint = cb714cd787519216d25edaad9f89a9c0ce1b8fbbbcdf90bda4c79f5d85fdf381, id = 24269a79-0172-4da5-9b4d-f61327072bf0, last_modified = 2021-10-04
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_LimeRAT author = ditekSHen, description = LimeRAT payload
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Limerat_24269a79 reference_sample = ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01, os = windows, severity = x86, creation_date = 2021-08-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Limerat, fingerprint = cb714cd787519216d25edaad9f89a9c0ce1b8fbbbcdf90bda4c79f5d85fdf381, id = 24269a79-0172-4da5-9b4d-f61327072bf0, last_modified = 2021-10-04
          Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Limerat_24269a79 reference_sample = ec781a714d6bc6fac48d59890d9ae594ffd4dbc95710f2da1f1aa3d5b87b9e01, os = windows, severity = x86, creation_date = 2021-08-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Limerat, fingerprint = cb714cd787519216d25edaad9f89a9c0ce1b8fbbbcdf90bda4c79f5d85fdf381, id = 24269a79-0172-4da5-9b4d-f61327072bf0, last_modified = 2021-10-04
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6D0E8
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6B130
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6A518
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B6A860
          Source: f5OhlYjA9Q.exeVirustotal: Detection: 66%
          Source: f5OhlYjA9Q.exeMetadefender: Detection: 65%
          Source: f5OhlYjA9Q.exeReversingLabs: Detection: 96%
          Source: f5OhlYjA9Q.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeFile created: C:\Users\user\AppData\Local\Temp\tmp970.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ???????????/????????????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ???????????/????????????.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: f5OhlYjA9Q.exe, ???????????/????????????.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: f5OhlYjA9Q.exe, ???????????/????????????.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: f5OhlYjA9Q.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: f5OhlYjA9Q.exe, ??????????/?????.csBase64 encoded string: 'U3lzdGVtXEN1cnJlbnRDb250cm9sU2V0XFNlcnZpY2VzXERpc2tcRW51bVw='
          Source: f5OhlYjA9Q.exe, ??????/?????????????.csBase64 encoded string: 'reC3Gq506tzRlGkwD9d6lQXTo/GMJOJVas2CFdWoGpF+hwEOMHoVQ5hsQpsLNMV9'
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ??????????/?????.csBase64 encoded string: 'U3lzdGVtXEN1cnJlbnRDb250cm9sU2V0XFNlcnZpY2VzXERpc2tcRW51bVw='
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ??????/?????????????.csBase64 encoded string: 'reC3Gq506tzRlGkwD9d6lQXTo/GMJOJVas2CFdWoGpF+hwEOMHoVQ5hsQpsLNMV9'
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeMutant created: \Sessions\1\BaseNamedObjects\B1B32F58AD76
          Source: f5OhlYjA9Q.exe, ?????/???????.csCryptographic APIs: 'TransformFinalBlock'
          Source: f5OhlYjA9Q.exe, ?????/???????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ?????/???????.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ?????/???????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: f5OhlYjA9Q.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: f5OhlYjA9Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: f5OhlYjA9Q.exe, ?????/?????.cs.Net Code: ???????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, ?????/?????.cs.Net Code: ???????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B623D0 push eax; retf
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeCode function: 0_2_00B62FEC push eax; retf

          Boot Survival

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR
          Source: f5OhlYjA9Q.exeBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exe TID: 3376Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWindow / User API: threadDelayed 9650
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeThread delayed: delay time: 922337203685477
          Source: f5OhlYjA9Q.exe, 00000000.00000002.676796293.00000000007BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5 2.40 GHz
          Source: f5OhlYjA9Q.exe, 00000000.00000002.681970901.000000000617A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5P
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5!p
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5R
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5Y
          Source: f5OhlYjA9Q.exe, 00000000.00000003.644413544.00000000066D6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET516LMEMp
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoContro
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5]
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5_
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5#
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523757903.000000000616B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5ReqLMEMp
          Source: f5OhlYjA9Q.exeBinary or memory string: \vboxhook.dllQY21kLmV4ZSAvYyBwaW5nIDAgLW4gMiAmIGRlbCA=
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5%
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5d
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523545148.00000000066CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5-
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5,
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523057323.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET53
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5w
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5|1?#
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5mberControlled
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET58
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682732698.0000000006707000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5BIOSLMEMp
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5|
          Source: f5OhlYjA9Q.exe, 00000000.00000003.643548521.00000000066B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer128
          Source: f5OhlYjA9Q.exe, 00000000.00000003.644437550.00000000066DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5@
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523057323.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5vr
          Source: f5OhlYjA9Q.exeBinary or memory string: vmwareqemu
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5F
          Source: f5OhlYjA9Q.exe, 00000000.00000002.681970901.000000000617A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5LMEMp
          Source: f5OhlYjA9Q.exe, 00000000.00000003.523113532.00000000007FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5|1
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5<p
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522515914.00000000066AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5J
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5
          Source: f5OhlYjA9Q.exe, 00000000.00000002.682288382.0000000006640000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareTMTKLWPWWin32_VideoController4YVZ7T8CVideoController120060621000000.000000-0009775.997display.infMSBDAHNBV5N77PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsTC8VBET5O
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Users\user\Desktop\f5OhlYjA9Q.exe VolumeInformation
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: f5OhlYjA9Q.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.f5OhlYjA9Q.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: f5OhlYjA9Q.exe PID: 5984, type: MEMORYSTR
          Source: C:\Users\user\Desktop\f5OhlYjA9Q.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
          Source: f5OhlYjA9Q.exe, 00000000.00000003.522857543.00000000060F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts121
          Windows Management Instrumentation
          Path InterceptionPath Interception1
          Disable or Modify Tools
          OS Credential Dumping1
          Query Registry
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Web Service
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
          Virtualization/Sandbox Evasion
          LSASS Memory131
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Non-Standard Port
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Obfuscated Files or Information
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Ingress Tool Transfer
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingData Transfer Size Limits2
          Non-Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
          Remote System Discovery
          VNCGUI Input CaptureExfiltration Over C2 Channel13
          Application Layer Protocol
          Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync113
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          f5OhlYjA9Q.exe66%VirustotalBrowse
          f5OhlYjA9Q.exe66%MetadefenderBrowse
          f5OhlYjA9Q.exe96%ReversingLabsByteCode-MSIL.Backdoor.LimeRAT
          f5OhlYjA9Q.exe100%AviraTR/Spy.Gen8
          f5OhlYjA9Q.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          0.0.f5OhlYjA9Q.exe.1d0000.0.unpack100%AviraHEUR/AGEN.1208284Download File
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          pastebin.com
          172.67.34.170
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://pastebin.com/raw/9uk330hRfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namef5OhlYjA9Q.exe, 00000000.00000002.677396151.0000000002511000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                172.67.34.170
                pastebin.comUnited States
                13335CLOUDFLARENETUSfalse
                102.133.180.23
                unknownSouth Africa
                8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679408
                Start date and time: 05/08/202218:06:112022-08-05 18:06:11 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 54s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:f5OhlYjA9Q.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:21
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/0@1/2
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, licensing.mp.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                18:07:19API Interceptor1x Sleep call for process: f5OhlYjA9Q.exe modified
                No context
                No context
                No context
                No context
                No context
                No created / dropped files found
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):5.933706659390986
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                File name:f5OhlYjA9Q.exe
                File size:29696
                MD5:0c9df96101af0ac8049408831d42dedd
                SHA1:a43aedc5578add2f07269f88b923536b9d239019
                SHA256:9207a09821cbdc73ff5c3909c74914e772a4c356cfcb58eea38f8eeb1ea0c11a
                SHA512:2079380e4b839ba4b46f8f7c9eb34dc85b33a2876faa968efed62c3eb544125395ad6fc0dbf29f627cbf47e4550366485f2e789545a3726dd12df0a7cbb6710b
                SSDEEP:768:rtFHGfbAqYxDeGRey0195mbUjlaMOVUUrjy:ppGTAqYxDeGRe9a+laZj
                TLSH:B0D27D4C77D16368C2DD5AB54BB1606B0DB15A079A3BDB1F0CC864D71B3BACA8741BE0
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b.................p............... ........@.. ....................................@................................
                Icon Hash:00828e8e8686b000
                Entrypoint:0x408e8e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x62E6C7E4 [Sun Jul 31 18:20:20 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x8e380x53.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x6e940x7000False0.49428013392857145data6.048898258700505IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .reloc0xa0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                DLLImport
                mscoree.dll_CorExeMain
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.5102.133.180.234976655522832296 08/05/22-18:07:22.413967TCP2832296ETPRO TROJAN njRAT/Bladabindi/LimeRAT Variant CnC Checkin497665552192.168.2.5102.133.180.23
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 18:07:20.818314075 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:20.818363905 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:20.818469048 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:20.848674059 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:20.848714113 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:20.906599045 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:20.906697035 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:20.910625935 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:20.910633087 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:20.910878897 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:21.105572939 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:21.393193960 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:21.435477972 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:21.657042980 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:21.657130957 CEST44349764172.67.34.170192.168.2.5
                Aug 5, 2022 18:07:21.657222986 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:21.661662102 CEST49764443192.168.2.5172.67.34.170
                Aug 5, 2022 18:07:21.733239889 CEST497665552192.168.2.5102.133.180.23
                Aug 5, 2022 18:07:21.920842886 CEST555249766102.133.180.23192.168.2.5
                Aug 5, 2022 18:07:21.920969963 CEST497665552192.168.2.5102.133.180.23
                Aug 5, 2022 18:07:22.413966894 CEST497665552192.168.2.5102.133.180.23
                Aug 5, 2022 18:07:22.654601097 CEST555249766102.133.180.23192.168.2.5
                Aug 5, 2022 18:07:28.179147959 CEST497665552192.168.2.5102.133.180.23
                Aug 5, 2022 18:07:28.423839092 CEST555249766102.133.180.23192.168.2.5
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 18:07:20.763665915 CEST5966153192.168.2.58.8.8.8
                Aug 5, 2022 18:07:20.783689976 CEST53596618.8.8.8192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 5, 2022 18:07:20.763665915 CEST192.168.2.58.8.8.80xa3ddStandard query (0)pastebin.comA (IP address)IN (0x0001)
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 5, 2022 18:07:20.783689976 CEST8.8.8.8192.168.2.50xa3ddNo error (0)pastebin.com172.67.34.170A (IP address)IN (0x0001)
                Aug 5, 2022 18:07:20.783689976 CEST8.8.8.8192.168.2.50xa3ddNo error (0)pastebin.com104.20.68.143A (IP address)IN (0x0001)
                Aug 5, 2022 18:07:20.783689976 CEST8.8.8.8192.168.2.50xa3ddNo error (0)pastebin.com104.20.67.143A (IP address)IN (0x0001)
                • pastebin.com
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.549764172.67.34.170443C:\Users\user\Desktop\f5OhlYjA9Q.exe
                TimestampkBytes transferredDirectionData
                2022-08-05 16:07:21 UTC0OUTGET /raw/9uk330hR HTTP/1.1
                Host: pastebin.com
                Connection: Keep-Alive
                2022-08-05 16:07:21 UTC0INHTTP/1.1 200 OK
                Date: Fri, 05 Aug 2022 16:07:21 GMT
                Content-Type: text/plain; charset=utf-8
                Transfer-Encoding: chunked
                Connection: close
                x-frame-options: DENY
                x-content-type-options: nosniff
                x-xss-protection: 1;mode=block
                cache-control: public, max-age=1801
                CF-Cache-Status: EXPIRED
                Last-Modified: Fri, 05 Aug 2022 10:14:18 GMT
                Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
                Server: cloudflare
                CF-RAY: 7360c906be0d909d-FRA
                2022-08-05 16:07:21 UTC0INData Raw: 31 33 0d 0a 31 30 32 2e 31 33 33 2e 31 38 30 2e 32 33 3a 35 35 35 32 0d 0a
                Data Ascii: 13102.133.180.23:5552
                2022-08-05 16:07:21 UTC0INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                No statistics
                Target ID:0
                Start time:18:07:14
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\f5OhlYjA9Q.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\f5OhlYjA9Q.exe"
                Imagebase:0x1d0000
                File size:29696 bytes
                MD5 hash:0C9DF96101AF0AC8049408831D42DEDD
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_LimeRAT, Description: Yara detected LimeRAT, Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Limerat_24269a79, Description: unknown, Source: 00000000.00000000.408797111.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                Reputation:low

                No disassembly