Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K3xL5Xy0XS.exe

Overview

General Information

Sample name:K3xL5Xy0XS.exe
renamed because original name is a hash value
Original sample name:6AFDD0CBDF70F3E75F423B1557648E85.exe
Analysis ID:1580311
MD5:6afdd0cbdf70f3e75f423b1557648e85
SHA1:6c5cf72a38f08fd41b9f4943efaa4fa3b4d92c66
SHA256:f5a76af6335f9ea831901a5fac818c22393fdb2d0d9408ce373018b24a2ddb71
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • K3xL5Xy0XS.exe (PID: 3808 cmdline: "C:\Users\user\Desktop\K3xL5Xy0XS.exe" MD5: 6AFDD0CBDF70F3E75F423B1557648E85)
    • RegSvcs.exe (PID: 2368 cmdline: "C:\Users\user\Desktop\K3xL5Xy0XS.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • conhost.exe (PID: 2196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.222.58.90:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x133ca:$a4: get_ScannedWallets
          • 0x12228:$a5: get_ScanTelegram
          • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
          • 0x10e6a:$a7: <Processes>k__BackingField
          • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1079e:$a9: <ScanFTP>k__BackingField
          00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              0.2.K3xL5Xy0XS.exe.2260000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.K3xL5Xy0XS.exe.2260000.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.K3xL5Xy0XS.exe.2260000.1.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x117ca:$a4: get_ScannedWallets
                  • 0x10628:$a5: get_ScanTelegram
                  • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                  • 0xf26a:$a7: <Processes>k__BackingField
                  • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0xeb9e:$a9: <ScanFTP>k__BackingField
                  0.2.K3xL5Xy0XS.exe.2260000.1.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
                  • 0xfbcb:$gen01: ChromeGetRoamingName
                  • 0xfbff:$gen02: ChromeGetLocalName
                  • 0xfc28:$gen03: get_UserDomainName
                  • 0x11e67:$gen04: get_encrypted_key
                  • 0x113e3:$gen05: browserPaths
                  • 0x1172b:$gen06: GetBrowsers
                  • 0x11061:$gen07: get_InstalledInputLanguages
                  • 0xe84f:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
                  • 0x6938:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
                  • 0x7318:$spe6: windows-1251, CommandLine:
                  • 0x125bd:$spe9: *wallet*
                  • 0xd00c:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
                  • 0xd107:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
                  • 0xd464:$typ03: A937C899247696B6565665BE3BD09607F49A2042
                  • 0xd571:$typ04: D67333042BFFC20116BF01BC556566EC76C6F7E2
                  • 0xd6f0:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
                  • 0xd098:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
                  • 0xd0c1:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
                  • 0xd25f:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
                  • 0xd59a:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
                  • 0xd639:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
                  0.2.K3xL5Xy0XS.exe.2260000.1.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0xe68a:$u7: RunPE
                  • 0x11d41:$u8: DownloadAndEx
                  • 0x7330:$pat14: , CommandLine:
                  • 0x11279:$v2_1: ListOfProcesses
                  • 0xe88b:$v2_2: get_ScanVPN
                  • 0xe92e:$v2_2: get_ScanFTP
                  • 0xf61e:$v2_2: get_ScanDiscord
                  • 0x1060c:$v2_2: get_ScanSteam
                  • 0x10628:$v2_2: get_ScanTelegram
                  • 0x106ce:$v2_2: get_ScanScreen
                  • 0x11416:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1144e:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x11709:$v2_2: get_ScanBrowsers
                  • 0x117ca:$v2_2: get_ScannedWallets
                  • 0x117f0:$v2_2: get_ScanWallets
                  • 0x11810:$v2_3: GetArguments
                  • 0xfed9:$v2_4: VerifyUpdate
                  • 0x147ea:$v2_4: VerifyUpdate
                  • 0x11bca:$v2_5: VerifyScanRequest
                  • 0x112c6:$v2_6: GetUpdates
                  • 0x147cb:$v2_6: GetUpdates
                  Click to see the 10 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:15.348866+010020450001Malware Command and Control Activity Detected185.222.58.9055615192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:19.970490+010020450011Malware Command and Control Activity Detected185.222.58.9055615192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:10.222100+010028496621Malware Command and Control Activity Detected192.168.2.449730185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:15.649470+010028493511Malware Command and Control Activity Detected192.168.2.449730185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:23.396942+010028482001Malware Command and Control Activity Detected192.168.2.449734185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:20.253921+010028493521Malware Command and Control Activity Detected192.168.2.449732185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:10.222100+010018000001Malware Command and Control Activity Detected192.168.2.449730185.222.58.9055615TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.RegSvcs.exe.160000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.58.90:55615"], "Bot Id": "cheat"}
                  Source: K3xL5Xy0XS.exeReversingLabs: Detection: 63%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: K3xL5Xy0XS.exeJoe Sandbox ML: detected
                  Source: K3xL5Xy0XS.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: RegSvcs.exe, 00000001.00000002.1882328233.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0022DBBE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002368EE FindFirstFileW,FindClose,0_2_002368EE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0023698F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D076
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D3A9
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00239642
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0023979D
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00239B2B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00235C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00235C97

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 1800000 - Severity 1 - Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect : 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2849352 - Severity 1 - ETPRO MALWARE RedLine - SetEnvironment Request : 192.168.2.4:49732 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2848200 - Severity 1 - ETPRO MALWARE RedLine - GetUpdates Request : 192.168.2.4:49734 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2045000 - Severity 1 - ET MALWARE RedLine Stealer - CheckConnect Response : 185.222.58.90:55615 -> 192.168.2.4:49730
                  Source: Network trafficSuricata IDS: 2849351 - Severity 1 - ETPRO MALWARE RedLine - EnvironmentSettings Request : 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2045001 - Severity 1 - ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound : 185.222.58.90:55615 -> 192.168.2.4:49730
                  Source: Malware configuration extractorURLs: 185.222.58.90:55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49734
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.58.90:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.58.90:55615Content-Length: 987905Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.58.90:55615Content-Length: 987897Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 185.222.58.90 185.222.58.90
                  Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0023CE44
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:55615
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:55615/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0023EAFF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0023ED6A
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0023EAFF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0022AA57
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00259576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00259576

                  System Summary

                  barindex
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: K3xL5Xy0XS.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: K3xL5Xy0XS.exe, 00000000.00000000.1668594220.0000000000282000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7457949b-d
                  Source: K3xL5Xy0XS.exe, 00000000.00000000.1668594220.0000000000282000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5aa88f64-e
                  Source: K3xL5Xy0XS.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ce0d0384-b
                  Source: K3xL5Xy0XS.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e40ad050-e
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0022D5EB
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00221201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00221201
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0022E8F6
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001CBF400_2_001CBF40
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002320460_2_00232046
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C80600_2_001C8060
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002282980_2_00228298
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001FE4FF0_2_001FE4FF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F676B0_2_001F676B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002548730_2_00254873
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001ECAA00_2_001ECAA0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001CCAF00_2_001CCAF0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001DCC390_2_001DCC39
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F6DD90_2_001F6DD9
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001DB1190_2_001DB119
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C91C00_2_001C91C0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E13940_2_001E1394
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E17060_2_001E1706
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E781B0_2_001E781B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C79200_2_001C7920
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001D997D0_2_001D997D
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E19B00_2_001E19B0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E7A4A0_2_001E7A4A
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E1C770_2_001E1C77
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E7CA70_2_001E7CA7
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0024BE440_2_0024BE44
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F9EEE0_2_001F9EEE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E1F320_2_001E1F32
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_016867080_2_01686708
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_008DE7B01_2_008DE7B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_008DDC901_2_008DDC90
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: String function: 001E0A30 appears 46 times
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: String function: 001DF9F2 appears 31 times
                  Source: K3xL5Xy0XS.exe, 00000000.00000003.1704782154.0000000004083000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs K3xL5Xy0XS.exe
                  Source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.000000000422D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs K3xL5Xy0XS.exe
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs K3xL5Xy0XS.exe
                  Source: K3xL5Xy0XS.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/49@1/1
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002337B5 GetLastError,FormatMessageW,0_2_002337B5
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002210BF AdjustTokenPrivileges,CloseHandle,0_2_002210BF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_002216C3
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002351CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_002351CD
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0024A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0024A67C
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0023648E
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001C42A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2196:120:WilError_03
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeFile created: C:\Users\user\AppData\Local\Temp\aut516D.tmpJump to behavior
                  Source: K3xL5Xy0XS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tmpD47B.tmp.1.dr, tmpC1A.tmp.1.dr, tmpD48B.tmp.1.dr, tmpD49C.tmp.1.dr, tmpD49D.tmp.1.dr, tmpD4AE.tmp.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: K3xL5Xy0XS.exeReversingLabs: Detection: 63%
                  Source: unknownProcess created: C:\Users\user\Desktop\K3xL5Xy0XS.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: wldp.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: K3xL5Xy0XS.exeStatic file information: File size 1058304 > 1048576
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: RegSvcs.exe, 00000001.00000002.1882328233.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E0A76 push ecx; ret 0_2_001E0A89

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49734
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001DF98E
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00251C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00251C41
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeAPI/Special instruction interceptor: Address: 168632C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2239Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7396Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeAPI coverage: 3.9 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0022DBBE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002368EE FindFirstFileW,FindClose,0_2_002368EE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0023698F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D076
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D3A9
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00239642
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0023979D
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00239B2B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00235C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00235C97
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.1882328233.0000000000617000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll 5c
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023EAA2 BlockInput,0_2_0023EAA2
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F2622
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E4CE8 mov eax, dword ptr fs:[00000030h]0_2_001E4CE8
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_016865F8 mov eax, dword ptr fs:[00000030h]0_2_016865F8
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_01686598 mov eax, dword ptr fs:[00000030h]0_2_01686598
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_01684F78 mov eax, dword ptr fs:[00000030h]0_2_01684F78
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00220B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00220B62
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F2622
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001E083F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E09D5 SetUnhandledExceptionFilter,0_2_001E09D5
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001E0C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 34E008Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00221201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00221201
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00202BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00202BA5
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022B226 SendInput,keybd_event,0_2_0022B226
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002422DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_002422DA
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00220B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00220B62
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00221663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00221663
                  Source: K3xL5Xy0XS.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: K3xL5Xy0XS.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E0698 cpuid 0_2_001E0698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00238195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00238195
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0021D27A GetUserNameW,0_2_0021D27A
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001FBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_001FBB6F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.1890110482.00000000069B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1707935052.0000000001594000.00000004.00000020.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1669566555.0000000001503000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_81
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_XP
                  Source: K3xL5Xy0XS.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_XPe
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_VISTA
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_7
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00241204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00241204
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00241806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00241806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares21
                  Input Capture
                  11
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS227
                  System Information Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets451
                  Security Software Discovery
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials321
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items321
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  K3xL5Xy0XS.exe63%ReversingLabsWin32.Trojan.AutoitInject
                  K3xL5Xy0XS.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://185.222.58.90:55615/0%Avira URL Cloudsafe
                  http://185.222.58.90:556150%Avira URL Cloudsafe
                  https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                  185.222.58.90:556150%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ip.sb
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    185.222.58.90:55615true
                    • Avira URL Cloud: safe
                    unknown
                    http://185.222.58.90:55615/true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ipinfo.io/ip%appdata%K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                        high
                        https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                            high
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/Endpoint/CheckConnectResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.datacontract.org/2004/07/RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://tempuri.org/Endpoint/EnvironmentSettingsRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/soap/envelope/RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                            high
                                            http://tempuri.org/RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://tempuri.org/Endpoint/CheckConnectRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                  high
                                                  https://www.ecosia.org/newtab/RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                    high
                                                    http://tempuri.org/Endpoint/VerifyUpdateResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://tempuri.org/Endpoint/SetEnvironmentRegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://tempuri.org/Endpoint/SetEnvironmentResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://tempuri.org/Endpoint/GetUpdatesRegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                              high
                                                              https://api.ipify.orgcookies//settinString.RemovegK3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://schemas.xmlsoap.org/ws/2004/08/addressingRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://tempuri.org/Endpoint/GetUpdatesResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                                    high
                                                                    http://tempuri.org/Endpoint/EnvironmentSettingsResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://tempuri.org/Endpoint/VerifyUpdateRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://tempuri.org/0RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://185.222.58.90:55615RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/soap/actor/nextRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                185.222.58.90
                                                                                unknownNetherlands
                                                                                51447ROOTLAYERNETNLtrue
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1580311
                                                                                Start date and time:2024-12-24 09:06:13 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 5m 12s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:6
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:K3xL5Xy0XS.exe
                                                                                renamed because original name is a hash value
                                                                                Original Sample Name:6AFDD0CBDF70F3E75F423B1557648E85.exe
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.evad.winEXE@4/49@1/1
                                                                                EGA Information:
                                                                                • Successful, ratio: 100%
                                                                                HCA Information:
                                                                                • Successful, ratio: 99%
                                                                                • Number of executed functions: 47
                                                                                • Number of non-executed functions: 296
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Stop behavior analysis, all processes terminated
                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                • Excluded IPs from analysis (whitelisted): 172.67.75.172, 104.26.12.31, 104.26.13.31, 172.202.163.200, 13.107.246.63
                                                                                • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                • VT rate limit hit for: K3xL5Xy0XS.exe
                                                                                TimeTypeDescription
                                                                                03:07:16API Interceptor63x Sleep call for process: RegSvcs.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                185.222.58.90DBAcglWJwi.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                QUOTATION062022.exeGet hashmaliciousFicker Stealer, RedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                QUOTATION 061622.exeGet hashmaliciousFicker Stealer, RedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                RFQ - FYKS - 06052022.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                MACHINE SPECIFICATIONS.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                MACHINE SPECIFICATIONS.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                ROOTLAYERNETNLInvoice-BL. Payment TT $ 16945.99.exeGet hashmaliciousRedLineBrowse
                                                                                • 45.137.22.164
                                                                                MfzXU6tKOq.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                                • 185.222.58.82
                                                                                lWnSA7IyVc.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                                • 185.222.58.229
                                                                                8ZVd2S51fr.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.241
                                                                                Purchase Order Purchase Order Purchase Order Purchase Order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                • 185.222.57.90
                                                                                Purchase Order Purchase Order Purchase Order Purchase Order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                • 185.222.57.90
                                                                                9dOKGgFNL2.exeGet hashmaliciousRedLineBrowse
                                                                                • 45.137.22.126
                                                                                RFQ List and airflight 2024.pif.exeGet hashmaliciousPureLog StealerBrowse
                                                                                • 45.137.22.174
                                                                                Calyciform.exeGet hashmaliciousGuLoaderBrowse
                                                                                • 45.137.22.248
                                                                                I5pvP0CU6M.exeGet hashmaliciousRedLineBrowse
                                                                                • 45.137.22.248
                                                                                No context
                                                                                No context
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):2666
                                                                                Entropy (8bit):5.345804351520589
                                                                                Encrypted:false
                                                                                SSDEEP:48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHjHKx1qHpHsLU:vq5qxqdqolqztYqh3oPtI6mq7qoT5DqO
                                                                                MD5:99EF806358EC635615FCC973DA805A5D
                                                                                SHA1:3D5E802B056A5CABB53707A30D60F9E8294CEC13
                                                                                SHA-256:99957E097E6DB3573742EFD7B473D80998DE5AEF0E473D2C505EBBB1252E8285
                                                                                SHA-512:7B340970383EB8685E2D3ADFE94E1B253DF7444ACA6EEA5859ED2DFFBCBCAFECE645961FF0C76E365EBA8ABF7A6444414E8D97363CC09BD34362E234DC51F21E
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral,
                                                                                Process:C:\Users\user\Desktop\K3xL5Xy0XS.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):74822
                                                                                Entropy (8bit):7.914269366918041
                                                                                Encrypted:false
                                                                                SSDEEP:1536:yf94gSIuZwL4WWNSn9po6VF26ddVIiV7fu7/6/Pjm/6npLMGExujS+iAmy:iB3uZwMjQ0HcLTuT6/PvuDH+iFy
                                                                                MD5:EFBA133AFE0685A74CBE14C631245B7C
                                                                                SHA1:2543F0173D222CB51546729B28AE606FD5557CDF
                                                                                SHA-256:3ABB56BEB0BE69F7A82A809EDB7DDC78DA5AD5858711FC5ACBE7D0480EE7D96E
                                                                                SHA-512:AF45F07EBB0BAD4CC4B84292D48AA5D20DD0F86D74B2F4684067183D6AE66424F747D3D6309F36F3C110F16618AA5E092E7DE2F10430314DCDC022249E88535F
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:EA06..~...84.6.N....n..Q....J-j...V.U.h.ni...O..4.Q~..o.....kp<.N.".O.....E(.H.S.\.G?..e....w\.H.....n.Mer..^.[..'f=w.R...7........(..u.eZ.T)..(..#..]F.p...j.Q.. ..-j..i.H..@..<.7...+.M.Wj4...J.Tk.....hwu.. ....N..:.lmF.].....~.u..G...J.N.D.....K.3....6.... .rsQ....z..WI..3...'/..!V..&u.._..."Y$r..eN....P.&d.....P..T.u..<.6..jT.;.....UF..NCh..H....U.....j...W$@.e..0.Rj4...Y..)..{iW..*..=j.D.....-B.E..)S*...u..[.).*.2.Wh.N...D..j3....p.`h.J...4.R.s.6.D......N.Q.]s.:}..g.. . .r..P.\9...h.R........Nj....f.V...J.Q....p..L.. .z...N..+....Q.....T.O.N$.-.Rg[.Qj..D..C.Q...5$......m0....:.*.R....J.= ...P...6.. .Z%F.Z......>.3..T..."Of..ez.f.Q.VN..eZ..3..mF.m.....h..?..%S. ..y..:.W...T.u/.:.*|..M.@3.Z.]..d <%z.R.T)t*ER.g.......i_..$....E.Qo5..RC&.u+.j..CP.N#T...K.N. .8.U..+.x...Q..m..Z.Y.*..T....:ej.O..*....Q.S.T.t..Y..*......H......L..*...+.\..R..X..1..).K.../..v.J]*.K...K.<.i..j.........F..r....4....K.J.1..)..]..Q.M..#....4.itZ.C... .....M%5@
                                                                                Process:C:\Users\user\Desktop\K3xL5Xy0XS.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):97792
                                                                                Entropy (8bit):6.861149961702125
                                                                                Encrypted:false
                                                                                SSDEEP:1536:G2UZPzfXtYQINw8ybnCy+db9P1wUyHjspYXI0UIlRF4P9tmKSccw:G9Zr/tY7NMbJ+djWspi8Il74PPmKSe
                                                                                MD5:F5C9A33F3F5423261FDB469888A27AD1
                                                                                SHA1:92F3D0ED439F262CDF227634CAAD344EBE051834
                                                                                SHA-256:06AE01D8BDD43054455D69A52FE04D05DC1F5BEF9493254D1A09CACEC5E7FA79
                                                                                SHA-512:1CFE459BCA1B4DC1447C9A1A12EBA7804E5BC58AC6DCAFEECB91957983D5C76E7BBF4E52DF97AC5F0DB0EC97BE66D2B51F127C084A3E104805EAE07F3F69022B
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...MSMQNAZON.JQ.PMQNEZO.2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQN.ZON<E._M.D.o.[...."8>p=#!"(.#.9+?#?9q, z=;\z#?m...n(5++.WG[iPMQNEZO.wZJ.LSM..I.ON2ZJQMP.QLDQN~2Z>PMPEQNEZON..KQMpMQNEZON2.JQmPMQLEZKN2ZJQMPIQNEZON2Z.PMPOQNEZON1Z..MP]QNUZON2JJQ]PMQNEZ_N2ZJQMPMQNE..O2.JQMP.PN.^ON2ZJQMPMQNEZON2ZJQ.QM]NEZON2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQnEZGN2ZJQMPMQNERoN2.JQMPMQNEZON../)9PMQz6[ON.ZJQ9QMQLEZON2ZJQMPMQNEzONRt8"?3MQN.^ON2.KQMVMQN3[ON2ZJQMPMQNEZ.N2.d#(<"2NEVON2Z.PMPOQNE&NN2ZJQMPMQNEZO.2Z.QMPMQNEZON2ZJQMP].OEZON2.JQMRMTN..ON..JQNPMQ.EZIN2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQUuSOn1ZJPMP\"OEZED0$IQMTh|Yc$MN2^.W]PMW=GZOD..IQMTePNEq J2Z@Zu.OQNB5JN2P]FT.EQND.YQ8.CQMQh.DDZKf4ZJ[>WMQD..XP.SJQLu.SOE^gH2Z@"JPM[.`BR.;ZJPh.JPNArIN2P9VMPG.fD[OH]RJQG\u.LEZ]L.SJQG]>XNE\\JAvKQKCH@J;PON8'KQMT3[NEP\H#^C"FPM[fIZOD]WJQG-LQNAKK53ZJUR_.XNE[j. [JUeVMQD6]ON85DQMZaKP.SON3...MPIyHEZE=5ZJ[^Vf.GZd.G2ZKt..MQJm\ON8)MQMZ?PNE*1D2Z@yBPM[fUZOD]TJQG}C@J>[ON6rNPMVf]_A!NN2^bRLPKBHT\g_2Z@k.QMQ_CL \2Z@BEBEy]EZE!
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.699434772658264
                                                                                Encrypted:false
                                                                                SSDEEP:24:Khfv+VFngw6i0t5Ut+l3kHwMDkhBlBAMFPxYaija:pvl6Pt5uQ3kQ0khBl1VxYpu
                                                                                MD5:02D3A9BE2018CD12945C5969F383EF4A
                                                                                SHA1:085F3165672114B2B8E9F73C629ADABBF99F178D
                                                                                SHA-256:6088E17DB4C586F5011BC5E16E8BF2E79C496EB6DAE177FF64D9713D39D500CA
                                                                                SHA-512:A126D98EE751D0FB768E4DB7D92CBC6AE7852FEE337B85ED045D871DB321C6C98FD58A244D058CA3F41348216C68CB4A37FA854980BB16D358AA62A932DD867E
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.695685570184741
                                                                                Encrypted:false
                                                                                SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                                                                                MD5:A28F7445BB3D064C83EB9DBC98091F76
                                                                                SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                                                                                SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                                                                                SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.701757898321461
                                                                                Encrypted:false
                                                                                SSDEEP:24:JTbqccbbEKOWHOHPG9HXJMTwDwW63KkUdx/d:JTbmzOxeRaTaq3KBL/d
                                                                                MD5:520219000D5681B63804A2D138617B27
                                                                                SHA1:2C7827C354FD7A58FB662266B7E3008AFB42C567
                                                                                SHA-256:C072675E83E91FC0F8D89A2AEC6E3BC1DB53ADF7601864DDC27B1866A8AEEF4D
                                                                                SHA-512:C558140907F6C78EB74EE0F053B0505A8BB72692B378F25B518FA417D97CCB2D0A8341691BECAA96ADCE757007D6DC2938995D983AAC65024123BB63715EBD7C
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.69156792375111
                                                                                Encrypted:false
                                                                                SSDEEP:24:wT4Ye6841ff8PdGjcDOa8AtDLSoarbrGxYsrxpuzu:/Ye68AIGjiOaDDc4uzu
                                                                                MD5:A4E170A8033E4DAE501B5FD3D8AC2B74
                                                                                SHA1:589F92029C10058A7B281AA9F2BBFA8C822B5767
                                                                                SHA-256:E3F62A514D12A3F7D0EB2FF2DA31113A72063AE2E96F816E9AD4185FF8B15C91
                                                                                SHA-512:FB96A5E674AE29C3AC9FC495E9C75B103AE4477E2CA370235ED8EA831212AC9CB1543CB3C3F61FD00C8B380836FE1CA679F40739D01C5DDE782C7297C31F4F3A
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.699434772658264
                                                                                Encrypted:false
                                                                                SSDEEP:24:Khfv+VFngw6i0t5Ut+l3kHwMDkhBlBAMFPxYaija:pvl6Pt5uQ3kQ0khBl1VxYpu
                                                                                MD5:02D3A9BE2018CD12945C5969F383EF4A
                                                                                SHA1:085F3165672114B2B8E9F73C629ADABBF99F178D
                                                                                SHA-256:6088E17DB4C586F5011BC5E16E8BF2E79C496EB6DAE177FF64D9713D39D500CA
                                                                                SHA-512:A126D98EE751D0FB768E4DB7D92CBC6AE7852FEE337B85ED045D871DB321C6C98FD58A244D058CA3F41348216C68CB4A37FA854980BB16D358AA62A932DD867E
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.695685570184741
                                                                                Encrypted:false
                                                                                SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                                                                                MD5:A28F7445BB3D064C83EB9DBC98091F76
                                                                                SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                                                                                SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                                                                                SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.701757898321461
                                                                                Encrypted:false
                                                                                SSDEEP:24:JTbqccbbEKOWHOHPG9HXJMTwDwW63KkUdx/d:JTbmzOxeRaTaq3KBL/d
                                                                                MD5:520219000D5681B63804A2D138617B27
                                                                                SHA1:2C7827C354FD7A58FB662266B7E3008AFB42C567
                                                                                SHA-256:C072675E83E91FC0F8D89A2AEC6E3BC1DB53ADF7601864DDC27B1866A8AEEF4D
                                                                                SHA-512:C558140907F6C78EB74EE0F053B0505A8BB72692B378F25B518FA417D97CCB2D0A8341691BECAA96ADCE757007D6DC2938995D983AAC65024123BB63715EBD7C
                                                                                Malicious:false
                                                                                Preview:VLZDGUKUTZXKWULZBWDOTEIBVHVGPZOMETVGLHEKQQVYNUMUAOLBNSHZYTRKXENILISUHDAEEZWZEUNNMWJTKJJOLHKIGJBIHEMLZPVHEUDLHUZCSBUYGAPQSLHCFWHXEYFYTFGZTQNGXBIUAIOYCCCESLXKQMZDVXCDPKMYSWUFQOOGYCQASGJXLVOEKXBOBXDUKGAWAMSEHSFOUBZESSHGPVUWBSAXMDDSNTFJRIJVCYNCFLCMAYHAQBOVOYCQICAPOEIAOZZDHRFCBPBIJRAALGUMCZXSSRKWWTLWRCAGMBKLQATMELORFDRFOPMXYZUWVDECUBFKJYGAVNPIZHJACVPSNOSYGMZANGHNGZCHMGRVBLZWYXERUYHSGKNYMBIUOUVRRQZNFUEYVDSYNZOGCQQJBPAGGARUGCQGPSYMVKYFEATFTUASPFCLAYVPLRCXWCNIABDDVKSFBVZOWZJRZCFQZOXEFZYNRBPBMSHMJFACGUVZUTNGJUEWYWGPCEUFNJTHREUEIHDYXUSJMKBAJVWGYJBJZIRJSRNLDQEVFZAKVMKFJSIHDAKHIEZERYMCSJLFMAKTAGUIBEYUESOJBCXDNFVMNZJABIUVYPQJTWFYBZJPMWLOIHNHFGQHJMNWDFCATRHJYRIXKFJEEOLVSFDPTZNPUFUNEEOLRHVCPOPPOMEZBYTGJKKWUQRHCTFVKQBJAPTOLZADSWVPJYRGRDUWSTNCXLPQDMPVWSSFEHFWHSYNGNHOYZMFADSOTZRZJWXBGUPDZLPMKTZHVIXOFUFHPBTLFRGMMRKOTCWSSRSSXZJNZJGFXMQMXYXKQOFUEAKEJMGPTQUQWYKCZWFGOGJXTRBDEBXQWSDHUFBWIRPNOOENTWWFRIBLZBMAFTMZPLFLLVKTGMUXNKLRFNYLEFNKJWPWNLANWBRDASFRDJUPHVZRHEFBINQCKMOVMQOLDBWPTMYMMFRCLWITZRVFLDSOIFRMJCCQXYLT
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.69156792375111
                                                                                Encrypted:false
                                                                                SSDEEP:24:wT4Ye6841ff8PdGjcDOa8AtDLSoarbrGxYsrxpuzu:/Ye68AIGjiOaDDc4uzu
                                                                                MD5:A4E170A8033E4DAE501B5FD3D8AC2B74
                                                                                SHA1:589F92029C10058A7B281AA9F2BBFA8C822B5767
                                                                                SHA-256:E3F62A514D12A3F7D0EB2FF2DA31113A72063AE2E96F816E9AD4185FF8B15C91
                                                                                SHA-512:FB96A5E674AE29C3AC9FC495E9C75B103AE4477E2CA370235ED8EA831212AC9CB1543CB3C3F61FD00C8B380836FE1CA679F40739D01C5DDE782C7297C31F4F3A
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):98304
                                                                                Entropy (8bit):0.08235737944063153
                                                                                Encrypted:false
                                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):98304
                                                                                Entropy (8bit):0.08235737944063153
                                                                                Encrypted:false
                                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):6.874117767647439
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:K3xL5Xy0XS.exe
                                                                                File size:1'058'304 bytes
                                                                                MD5:6afdd0cbdf70f3e75f423b1557648e85
                                                                                SHA1:6c5cf72a38f08fd41b9f4943efaa4fa3b4d92c66
                                                                                SHA256:f5a76af6335f9ea831901a5fac818c22393fdb2d0d9408ce373018b24a2ddb71
                                                                                SHA512:b550dbba19c53f55d1433cfbd38fff724c9759da4232597f1b3213e98529f440854a32387eb4a7a7aea2b6a2601816e13b0cfd2ab8712c2f6ef0ec66a2c5028d
                                                                                SSDEEP:24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8abXTaR:ATvC/MTQYxsWR7abX
                                                                                TLSH:9835AF027391C062FF9BA2334F5AF6515BBC69260123E62F13981D79BE701B1563E7A3
                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                Entrypoint:0x420577
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x67635B63 [Wed Dec 18 23:31:47 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:1
                                                                                File Version Major:5
                                                                                File Version Minor:1
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:1
                                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                Instruction
                                                                                call 00007FE8B4B0E2C3h
                                                                                jmp 00007FE8B4B0DBCFh
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                push dword ptr [ebp+08h]
                                                                                mov esi, ecx
                                                                                call 00007FE8B4B0DDADh
                                                                                mov dword ptr [esi], 0049FDF0h
                                                                                mov eax, esi
                                                                                pop esi
                                                                                pop ebp
                                                                                retn 0004h
                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                mov eax, ecx
                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                                mov dword ptr [ecx], 0049FDF0h
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                push dword ptr [ebp+08h]
                                                                                mov esi, ecx
                                                                                call 00007FE8B4B0DD7Ah
                                                                                mov dword ptr [esi], 0049FE0Ch
                                                                                mov eax, esi
                                                                                pop esi
                                                                                pop ebp
                                                                                retn 0004h
                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                mov eax, ecx
                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                mov esi, ecx
                                                                                lea eax, dword ptr [esi+04h]
                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                and dword ptr [eax], 00000000h
                                                                                and dword ptr [eax+04h], 00000000h
                                                                                push eax
                                                                                mov eax, dword ptr [ebp+08h]
                                                                                add eax, 04h
                                                                                push eax
                                                                                call 00007FE8B4B1096Dh
                                                                                pop ecx
                                                                                pop ecx
                                                                                mov eax, esi
                                                                                pop esi
                                                                                pop ebp
                                                                                retn 0004h
                                                                                lea eax, dword ptr [ecx+04h]
                                                                                mov dword ptr [ecx], 0049FDD0h
                                                                                push eax
                                                                                call 00007FE8B4B109B8h
                                                                                pop ecx
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                mov esi, ecx
                                                                                lea eax, dword ptr [esi+04h]
                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                push eax
                                                                                call 00007FE8B4B109A1h
                                                                                test byte ptr [ebp+08h], 00000001h
                                                                                pop ecx
                                                                                Programming Language:
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x2ba64.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000x7594.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0xd40000x2ba640x2bc00c3b7286dd98abfbcbeabf90a9f069624False0.8480580357142857data7.689522450358481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x1000000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                RT_RCDATA0xdc7b80x22d2bdata1.0003575559995794
                                                                                RT_GROUP_ICON0xff4e40x76dataEnglishGreat Britain0.6610169491525424
                                                                                RT_GROUP_ICON0xff55c0x14dataEnglishGreat Britain1.25
                                                                                RT_GROUP_ICON0xff5700x14dataEnglishGreat Britain1.15
                                                                                RT_GROUP_ICON0xff5840x14dataEnglishGreat Britain1.25
                                                                                RT_VERSION0xff5980xdcdataEnglishGreat Britain0.6181818181818182
                                                                                RT_MANIFEST0xff6740x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                DLLImport
                                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                UxTheme.dllIsThemeActive
                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishGreat Britain
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-12-24T09:07:10.222100+01001800000Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect1192.168.2.449730185.222.58.9055615TCP
                                                                                2024-12-24T09:07:10.222100+01002849662ETPRO MALWARE RedLine - CheckConnect Request1192.168.2.449730185.222.58.9055615TCP
                                                                                2024-12-24T09:07:15.348866+01002045000ET MALWARE RedLine Stealer - CheckConnect Response1185.222.58.9055615192.168.2.449730TCP
                                                                                2024-12-24T09:07:15.649470+01002849351ETPRO MALWARE RedLine - EnvironmentSettings Request1192.168.2.449730185.222.58.9055615TCP
                                                                                2024-12-24T09:07:19.970490+01002045001ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound1185.222.58.9055615192.168.2.449730TCP
                                                                                2024-12-24T09:07:20.253921+01002849352ETPRO MALWARE RedLine - SetEnvironment Request1192.168.2.449732185.222.58.9055615TCP
                                                                                2024-12-24T09:07:23.396942+01002848200ETPRO MALWARE RedLine - GetUpdates Request1192.168.2.449734185.222.58.9055615TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 24, 2024 09:07:08.808866024 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:08.928469896 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:08.928591967 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:08.943974972 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:09.063496113 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:09.302311897 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:09.422049046 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:10.170922995 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:10.222100019 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.229016066 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.229069948 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.348865986 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.348889112 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649280071 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649331093 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649368048 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649470091 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.651402950 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.651442051 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.651483059 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.706438065 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.726368904 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726452112 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726464033 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726479053 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726522923 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.726578951 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.850333929 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.850625992 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.970375061 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:19.970455885 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.970489979 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:19.970582008 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.971282005 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.971503973 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.090837955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.090946913 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091062069 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091073990 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091085911 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091125965 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091149092 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091209888 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091268063 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091290951 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091300964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091337919 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091356039 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091387033 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091408014 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091417074 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091433048 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091454983 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.210655928 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210697889 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210710049 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210787058 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.210804939 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210814953 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210855007 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.210886002 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.211544991 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.253771067 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.253921032 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.372908115 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.373050928 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.420907974 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.420973063 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.536670923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.536745071 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.624758005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.624830961 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.776752949 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.776839972 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.940877914 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.941085100 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.941175938 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.060914040 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.060983896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061047077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061075926 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061075926 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061104059 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061115980 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061136007 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061147928 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061152935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061182022 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061208963 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061232090 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061235905 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061254025 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061269045 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061290026 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061319113 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061326981 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061346054 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061359882 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061398983 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061399937 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061450005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061484098 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061495066 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061532974 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061536074 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061566114 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061621904 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061650991 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061682940 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061733961 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061775923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061856031 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061943054 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061986923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062000990 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062077999 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062082052 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062118053 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062124014 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062170029 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062213898 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062257051 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062349081 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062401056 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062505007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062534094 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062560081 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062565088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09: