Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2T10XBqS6g.exe

Overview

General Information

Sample name:2T10XBqS6g.exe
Analysis ID:1590600
MD5:5266c53649caa9edea2f4ab58d58f511
SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Maps a DLL or memory area into another process
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • 2T10XBqS6g.exe (PID: 1308 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
    • 2T10XBqS6g.exe (PID: 5392 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
      • 2T10XBqS6g.exe (PID: 1256 cmdline: C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
      • 2T10XBqS6g.exe (PID: 4004 cmdline: C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
      • 2T10XBqS6g.exe (PID: 4320 cmdline: C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.29608235875.0000000003320000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 3 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\2T10XBqS6g.exe, ProcessId: 5392, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Gisne212
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\2T10XBqS6g.exe, ProcessId: 5392, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Gisne212

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\2T10XBqS6g.exe, ProcessId: 5392, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:34.412582+010020327761Malware Command and Control Activity Detected192.168.11.204976743.226.229.2093980TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:34.965588+010020327771Malware Command and Control Activity Detected43.226.229.2093980192.168.11.2049767TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:35.990656+010028033043Unknown Traffic192.168.11.2049769178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:26.452527+010028032702Potentially Bad Traffic192.168.11.2049765109.99.162.14443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2T10XBqS6g.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batAvira: detection malicious, Label: TR/AD.NsisInject.bzfqp
              Source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batReversingLabs: Detection: 31%
              Source: 2T10XBqS6g.exeVirustotal: Detection: 33%Perma Link
              Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,3_2_00404423
              Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49765 version: TLS 1.2
              Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp
              Source: Binary string: mshtml.pdbUGP source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A310F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_33A310F1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A36580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,2_2_33A36580
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Sufferers.GyrJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\utidige.GauJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Temp\nsg374D.tmpJump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49767 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 43.226.229.209:3980 -> 192.168.11.20:49767
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealthy.zapto.org
              Source: global trafficTCP traffic: 192.168.11.20:49767 -> 43.226.229.209:3980
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 109.99.162.14 109.99.162.14
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.11.20:49769 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49765 -> 109.99.162.14:443
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909533860.0000000002328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909533860.0000000002328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
              Source: 2T10XBqS6g.exe, 00000003.00000002.29915367921.0000000002B12000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912441543.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912000808.0000000002B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: .povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"prompt equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910892852.0000000002B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: domain":"www.povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"prompt equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: 2T10XBqS6g.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910013869.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909703869.0000000002319000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910013869.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909703869.0000000002319000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.yahoo.com (Yahoo)
              Source: 2T10XBqS6g.exe, 00000002.00000002.30677721055.0000000033910000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000002.00000002.30677721055.0000000033910000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: teldrum.ro
              Source: global trafficDNS traffic detected: DNS query: linktreewealth.zapto.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.geotrust.com/GeoTrustECCCA2018.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.thawte.com/ThawteRSACA2018.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cdp.geotrust.com/GeoTrustECCCA2018.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cdp.thawte.com/ThawteRSACA2018.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://certs.godaddy.com/repository/1301
              Source: bhvF184.tmp.3.drString found in binary or memory: http://contentstorage.osi.office.net/
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.globalsign.com/gsgccr3dvtlsca2020.crl0#
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdig2s1-2558.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.rootg2.amazontrust.com/rootg2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.sca1b.amazontrust.com/sca1b.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertSHA2SecureServerCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0D
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-server-g6.crl04
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g6.crl0/
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g7.crl0/
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-server-g6.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g6.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g7.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.rootg2.amazontrust.com/rootg2.cer0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.sca1b.amazontrust.com/sca1b.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
              Source: bhvF184.tmp.3.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E3000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: http://geoplugin.net/json.gp
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp:0
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpON
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpR
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp_c1628
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
              Source: 2T10XBqS6g.exe, Hovedrevisorat.bat.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: bhvF184.tmp.3.drString found in binary or memory: http://o.ss2.us/0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0G
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0K
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0M
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0O
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/ca/gsovsha2g4r30
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr3dvtlsca20200V
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/02
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/05
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gsr10)
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gts1c301
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gtsr100
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.rootg2.amazontrust.com08
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.sca1b.amazontrust.com06
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0%
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr30;
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocspx.digicert.com0E
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0$
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
              Source: bhvF184.tmp.3.drString found in binary or memory: http://s.ss2.us/r.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt09
              Source: bhvF184.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsovsha2g4r3.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
              Source: bhvF184.tmp.3.drString found in binary or memory: http://status.geotrust.com0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://status.thawte.com09
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0u
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0v
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000626000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000003.29882757737.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000003.29882687317.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: 2T10XBqS6g.exe, 00000005.00000002.29883025139.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/P
              Source: 2T10XBqS6g.exe, 00000005.00000003.29882757737.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000003.29882687317.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: 2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
              Source: bhvF184.tmp.3.drString found in binary or memory: http://x.ss2.us/x.cer0&
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
              Source: 2T10XBqS6g.exe, 00000003.00000003.29906195815.000000000232D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907330745.000000000232D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=37393684334
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
              Source: bhvF184.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?b463cc9221b0d1cf6b255213
              Source: bhvF184.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?d61d17a32b075ad284d0798e
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/2_vD0yppaJX3jBnfbHF1hqXQ2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5Q
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRi
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_Gray_X-qkgtg8KmnQEvm_9mDTcw2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/favicon.ico
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&conn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapcomponentshim_yGKy8jAx8RL2bLqmBF063w2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapshim_IX6xrWCoGcREOsbbsQ1Yvg2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/converged_ux_v2_nBE5FSqn9KpH44ZlTc3VqQ2.css?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/corewin10_Lmno_4TyJLm7Xee3gF3aOg2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/datarequestpackage_h-_7C7UzwdefXJT9njDBTQ2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gt
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZE
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?daed76fa672ed2fa739774d44bb38da5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?e77f8dc2c88b806ec91fb50956aeee97
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC05934b07a40a4d8a9a0cc7a79e85434
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC9fc5c8b8bfb94ba5833ba8065b1de35
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://az416426.vo.msecnd.net/scripts/a/ai.0.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://az725175.vo.msecnd.net/scripts/jsll-4.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://btloader.com/tag?o=6208086025961472&upapi=true
              Source: bhvF184.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/
              Source: bhvF184.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/ig-bank/ad-engagement/startAnimation/main/index.html
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://certs.godaddy.com/repository/0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contentstorage.osi.office.net/dynamiccanvas/licensingui/index.html?mode=NewDeviceActivation
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/48/nrrV39259.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/ads-programmable
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/recaptcha/1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/ads-programmable
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/recaptcha
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/storyset?platform=desktop&release=20h2&schema=3.0&sku=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/tip-contentset?platform=desktop&release=20h2&schema=3.
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/5c08e5e7-4cfd-4901-acbc-79925276672c/33c540c16
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/fb5aa6fc-fb0f-43c0-9aba-9bf4642cdd05/9a3b4a8d1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
              Source: bhvF184.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?bbc9af5ecc12954d59c63a1771114562
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://eb2.3lift.com/sync?
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-TEB31r4b&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://evoke-windowsservices-tas.msedge.net/ab
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?6e329cf6426f83c8ee02e2bc96bdb46d
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?d2c6e729d235d3f335d1d4751bb8eb91
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: bhvF184.tmp.3.drString found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
              Source: bhvF184.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/ads?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910013869.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909703869.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906461380.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906793776.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906663827.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912965995.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906730051.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906528564.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909941573.0000000002312000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211https://googleads.g.doubleclick.net/page
              Source: bhvF184.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ib.3lift.com/sync.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ib.adnxs.com/
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://ib.adnxs.com/async_usersync_file
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DnuZ
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Dnv6
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DsDH
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRT?ver=5f90
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRY?ver=52e8
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4IMai
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4IQAK
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OALs
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OAdg?ver=1c49
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrw?ver=d941
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrz?ver=8427
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OI51?ver=0686
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ONWz
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4n1yl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJ7
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJa
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4nqTh
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWB7v5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIa
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIj
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWG0VH
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWLuYO
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKp8YX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAMqFmF?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODMk8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODQmd?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODept?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEFck?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=82
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEQ0I?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4WR?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4Xx?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFBrV?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFC5q?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFE0J?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=70
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFENj?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFJFJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFLk7?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=43
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFWV8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFhty?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFsUC?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFu51?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFy7B?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFyKG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=60
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG3Y7?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG88s?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGPXq?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGQtJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGV90?h=194&w=300&m=6&q=60&u=t&o=t&l=f&x=5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGapF?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGlbE?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGmTG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGyYN?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH2Ml?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH6xB?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB14hq0P?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1aXBV1?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cEP3G?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cG73h?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1ftEY0?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1gEFcn?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1kc8s?m=6&o=true&u=true&n=true&w=30&h=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7gRE?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7hg4?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBVuddh?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBX2afX?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=htt
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
              Source: 2T10XBqS6g.exe, 00000003.00000002.29914960133.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913396163.000000000230F000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913153604.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913297087.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913101979.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/
              Source: 2T10XBqS6g.exe, 00000003.00000002.29914960133.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913396163.000000000230F000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913153604.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913297087.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913101979.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
              Source: 2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/TI
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909941573.0000000002312000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&checkda=1&ct=1632306842&rver=7.0.6730.0&wp=l
              Source: 2T10XBqS6g.exe, 00000003.00000003.29906195815.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912965995.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906730051.000000000231D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/login.srfhttps://www.google.com/pagead/drt/uihttps://www.google.com/recaptcha
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?route=C512_BAY&stsid=S.BC4837E917425070&uaid=d9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-DhB9Gg0Em7s2jvLPGG9crywwB
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604&scid=1&mkt=en-US&Platform=Windows10&clienti
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?route=C512_BAY&uaid=b6de8762e4ae48b19a7d0d74ba392110
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/post.srf?mkt=en-US&platform=Windows10&id=80604&clientid=000000004807
              Source: 2T10XBqS6g.exe, 00000003.00000002.29914960133.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913396163.000000000230F000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913153604.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913297087.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913101979.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
              Source: 2T10XBqS6g.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedFinishStrings.en_n0x1vWZ9nk5hsb6ZgnoOdw2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_VjBVCmhpr777yb9vmuAJ
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/WinJS_vcvx4TydCFioSeM4NLxTDw2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_43280e0ba671a1d8b5e34f1931c4fe4b.sv
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_white_8257b0707cbe1d0bd2661b8006
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031be
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostFinish_PCore_uuJCSTysLQ9JSYLCWmrHPQ2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostLogin_PCore_3J49gjRV3LSCVj6qj73kPQ2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/asyncchunk/win10hostlogin_ppassword_0901d04301714f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msftauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
              Source: bhvF184.tmp.3.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=0&ver=16&build=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=1&ver=16&build=1
              Source: 2T10XBqS6g.exe, 00000003.00000003.29906793776.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906528564.0000000002B16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrdres://C:
              Source: bhvF184.tmp.3.drString found in binary or memory: https://outlookmobile-office365-tas.msedge.net/ab?clientId=512A4435-60B8-42A2-80D3-582B6B7FB6C0&ig=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2787436b358dbd81d7fd0a0cccb05788
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f068a709ecd1f0c000b440d901cea9b
              Source: bhvF184.tmp.3.drString found in binary or memory: https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CPuOuO2wkvMCFQDJuwgdDw4EyQ&gqi=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://pki.goog/repository/0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://polyfill.io/v3/polyfill.min.js?features=2CElement.prototype.matches%2CElement.prototype.clos
              Source: bhvF184.tmp.3.drString found in binary or memory: https://px.ads.linkedin.com/setuid?partner=tripleliftdbredirect&tlUid=13122329571212727769&dbredirec
              Source: bhvF184.tmp.3.drString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/7zPvmktG8JzqA0vnWzpk_g--~A/Zmk9Zml0O3c9NjIyO2g9MzY4O2FwcGlkPWdlbWl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k4.jpg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
              Source: bhvF184.tmp.3.drString found in binary or memory: https://sectigo.com/CPS0
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909941573.0000000002312000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://servedby.flashtalking.com/imp/8/106228;3700839;201;jsiframe;Adobe;1000x463DESKTOPACROBATREAD
              Source: bhvF184.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=4aeddfea844042999a22bdcca1fba378&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=838b780a64e64b0d92d628632c1c377c&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?fa0d4adae7a556f7d0d03112de822178
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jque
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/css/f60532dd-d68e7b58/direct
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-2923b6c2/directi
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-d017f019/directi
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/cfdbd9.png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAKp8YX.img?h=16&w=16&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAMqFmF.img?h=16&w=16&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODMk8.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODQmd.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODept.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEFck.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEQ0I.img?h=368&w=62
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4WR.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4Xx.img?h=368&w=62
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFBrV.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFC5q.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=250&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFE0J.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFENj.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFJFJ.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFLk7.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFWV8.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFhty.img?h=368&w=62
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFsUC.img?h=250&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFu51.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFy7B.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFyKG.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG3Y7.img?h=250&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG3Y7.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG88s.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGPXq.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGQtJ.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGV90.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGapF.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGlbE.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGmTG.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGyYN.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH2Ml.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH6xB.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB14hq0P.img?h=368&w=6
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1aXBV1.img?h=27&w=27
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cEP3G.img?h=27&w=27
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cG73h.img?h=27&w=27
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1ftEY0.img?h=16&w=16
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1gEFcn.img?h=16&w=16
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1kc8s.img?m=6&o=true
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7gRE.img?h=16&w=16&m
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7hg4.img?h=16&w=16&m
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBVuddh.img?h=16&w=16&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&w=27&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/_h/975a7d20/webcore/externalscripts/jquery/jquery
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/css/b5dff51-e7c3b187/kernel-9c
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/js/b5dff51-96897e59/kernel-1e4
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/2578937774238713912_2802581922324906360.jpeg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/6852827437855218848_345419970373613283.jpeg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-bold.wof
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-regular.
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semiligh
              Source: 2T10XBqS6g.exe, 00000003.00000003.29912000808.0000000002B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
              Source: bhvF184.tmp.3.drString found in binary or memory: https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?3d88065febcc552cae09e5e8b74c55d5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?7616d616e1c668bb563496121e660bee
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?01af3f8dd36bcb49643452aa096ff6c0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?7de2246f1808e47769e35183d0153a7a
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?d0400e0387468531bdf7da710e2ae325
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?f0f9f226f444e2e246f9075ea908a633
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
              Source: 2T10XBqS6g.exe, 00000002.00000002.30676309614.0000000032490000.00000004.00001000.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E9000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin
              Source: 2T10XBqS6g.exe, 00000002.00000002.30676309614.0000000032490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binVentsDyrcrestereamuschilor.ro/NJrdZqNcCtz102.bin
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin_
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bins
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/html5/ssrh.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/in_page_full_auto_V1/Responsive_Monte_GpaSingleIfra
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/abg_lite.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/qs_click_protection.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/window_focus.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/simgad/14585816484902221120
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/d?subset_id=2&fvd=n3&v=3
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/ecr2zvs.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.globalsign.com/repository/0
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/
              Source: 2T10XBqS6g.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/chrome/
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/pagead/drt/ui
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/recaptcha/api2/aframe
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.googleadservices.com/pagead/p3p.xml
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/osd.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/
              Source: 2T10XBqS6g.exe, 00000003.00000003.29904972757.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29905258088.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/?ocid=iehp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/consent/55a804ab-e5c6-4b97-9319-8
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otBannerSdk
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otTCF-ie.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregula
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49765 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_0040987A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,3_2_004098E2
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_00406DFC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_00406E9F
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004068B5
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess Stats: CPU usage > 6%
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00401806 NtdllDefWindowProc_W,3_2_00401806
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004018C0 NtdllDefWindowProc_W,3_2_004018C0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004016FD NtdllDefWindowProc_A,4_2_004016FD
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004017B7 NtdllDefWindowProc_A,4_2_004017B7
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00402CAC NtdllDefWindowProc_A,5_2_00402CAC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00402D66 NtdllDefWindowProc_A,5_2_00402D66
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_70251BFF0_2_70251BFF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A3B5C12_2_33A3B5C1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00406E8F3_2_00406E8F
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044B0403_2_0044B040
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0043610D3_2_0043610D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004473103_2_00447310
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044A4903_2_0044A490
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040755A3_2_0040755A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0043C5603_2_0043C560
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044B6103_2_0044B610
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044D6C03_2_0044D6C0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004476F03_2_004476F0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044B8703_2_0044B870
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044081D3_2_0044081D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004149573_2_00414957
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004079EE3_2_004079EE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00407AEB3_2_00407AEB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044AA803_2_0044AA80
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00412AA93_2_00412AA9
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404B743_2_00404B74
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404B033_2_00404B03
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044BBD83_2_0044BBD8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404BE53_2_00404BE5
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404C763_2_00404C76
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00415CFE3_2_00415CFE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00416D723_2_00416D72
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00446D303_2_00446D30
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00446D8B3_2_00446D8B
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004050384_2_00405038
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0041208C4_2_0041208C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004050A94_2_004050A9
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0040511A4_2_0040511A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0043C13A4_2_0043C13A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004051AB4_2_004051AB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004493004_2_00449300
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0040D3224_2_0040D322
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044A4F04_2_0044A4F0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0043A5AB4_2_0043A5AB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004136314_2_00413631
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004466904_2_00446690
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044A7304_2_0044A730
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004398D84_2_004398D8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004498E04_2_004498E0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044A8864_2_0044A886
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0043DA094_2_0043DA09
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00438D5E4_2_00438D5E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00449ED04_2_00449ED0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0041FE834_2_0041FE83
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00430F544_2_00430F54
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004050C25_2_004050C2
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004014AB5_2_004014AB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004051335_2_00405133
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004051A45_2_004051A4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004012465_2_00401246
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_0040CA465_2_0040CA46
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004052355_2_00405235
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004032C85_2_004032C8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004222D95_2_004222D9
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004016895_2_00401689
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00402F605_2_00402F60
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00416760 appears 69 times
              Source: 2T10XBqS6g.exe, 00000002.00000003.29879783492.0000000002959000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917954698.000000000296E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917676178.0000000002969000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A1B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917433812.0000000002969000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917547483.00000000331DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exeBinary or memory string: OriginalFileName vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exeBinary or memory string: OriginalFilename vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000005.00000002.29883097012.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@9/13@3/3
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,3_2_004182CE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,5_2_00410DE1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,LdrInitializeThunk,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,3_2_00413D4C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004021AF LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,0_2_004021AF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,3_2_0040B58D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\eftermodnendesJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIG
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsg374C.tmpJump to behavior
              Source: 2T10XBqS6g.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: 2T10XBqS6g.exe, 00000002.00000002.30677721055.0000000033910000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: 2T10XBqS6g.exe, 00000003.00000003.29911533073.0000000002B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE benefit_merchant_domains (benefit_id VARCHAR NOT NULL, merchant_domain VARCHAR NOT NULL)U;
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: 2T10XBqS6g.exe, 00000003.00000002.29915367921.0000000002B12000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912441543.0000000002B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909980262.0000000002B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "autofill_profile_edge_extended" ( guid VARCHAR PRIMARY KEY, date_of_birth_day VARCHAR, date_of_birth_month VARCHAR, date_of_birth_year VARCHAR, source INTEGER NOT NULL DEFAULT 0, source_id VARCHAR)[;
              Source: 2T10XBqS6g.exeVirustotal: Detection: 33%
              Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_4-33208
              Source: unknownProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.cfgJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp
              Source: Binary string: mshtml.pdbUGP source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeUnpacked PE file: 3.2.2T10XBqS6g.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeUnpacked PE file: 4.2.2T10XBqS6g.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeUnpacked PE file: 5.2.2T10XBqS6g.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: 00000000.00000002.29608235875.0000000003320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_70251BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70251BFF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_702530C0 push eax; ret 0_2_702530EE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A41219 push esp; iretd 2_2_33A4121A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32806 push ecx; ret 2_2_33A32819
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044693D push ecx; ret 3_2_0044694D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DB84
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DBAC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00451D54 push eax; ret 3_2_00451D61
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0A4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0CC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00451D34 push eax; ret 4_2_00451D41
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00444E71 push ecx; ret 4_2_00444E81
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00414060 push eax; ret 5_2_00414074
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00414060 push eax; ret 5_2_0041409C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00414039 push ecx; ret 5_2_00414049
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004164EB push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00416553 push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00416555 push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004047CB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI/Special instruction interceptor: Address: 35F8841
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI/Special instruction interceptor: Address: 1A48841
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEE
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE694
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611538392.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30666076495.0000000002C60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindow / User API: threadDelayed 3606Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindow / User API: threadDelayed 5383Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindow / User API: foregroundWindowGot 1757Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI coverage: 10.0 %
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 5664Thread sleep count: 3606 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 5076Thread sleep count: 84 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 5076Thread sleep time: -42000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 1384Thread sleep count: 5383 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 1384Thread sleep time: -16149000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeThread sleep count: Count: 3606 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A310F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_33A310F1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A36580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,2_2_33A36580
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00418981 memset,GetSystemInfo,3_2_00418981
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Sufferers.GyrJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\utidige.GauJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Temp\nsg374D.tmpJump to behavior
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe694
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exee
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611538392.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30666076495.0000000002C60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0v
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4386
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4391
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_4-34113
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32639 IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A32639
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_70251BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70251BFF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A34AB4 mov eax, dword ptr fs:[00000030h]2_2_33A34AB4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A3724E GetProcessHeap,2_2_33A3724E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_33A32B1C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32639 IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A32639
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A360E2 LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A360E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: NULL target: C:\Users\user\Desktop\2T10XBqS6g.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: NULL target: C:\Users\user\Desktop\2T10XBqS6g.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: NULL target: C:\Users\user\Desktop\2T10XBqS6g.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"Jump to behavior
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager_K
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\\Sy:~
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\H;.
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere$s
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmp, logs.dat.2.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32933 cpuid 2_2_33A32933
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_33A32264
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,4_2_004082CD
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: ESMTPPassword4_2_004033F0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword4_2_00402DB3
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword4_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 1256, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIGJump to behavior
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              1
              Credentials In Files
              128
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets431
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
              Virtualization/Sandbox Evasion
              Cached Domain Credentials12
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590600 Sample: 2T10XBqS6g.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 30 linktreewealth.zapto.org 2->30 32 teldrum.ro 2->32 34 geoplugin.net 2->34 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Antivirus detection for dropped file 2->52 54 9 other signatures 2->54 8 2T10XBqS6g.exe 23 2->8         started        signatures3 process4 file5 24 C:\Users\user\AppData\Local\...\System.dll, PE32 8->24 dropped 56 Detected unpacking (changes PE section rights) 8->56 58 Tries to steal Mail credentials (via file registry) 8->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->60 62 2 other signatures 8->62 12 2T10XBqS6g.exe 5 19 8->12         started        signatures6 process7 dnsIp8 36 linktreewealth.zapto.org 43.226.229.209, 3980, 49767, 49768 SOFTLAYERUS Hong Kong 12->36 38 teldrum.ro 109.99.162.14, 443, 49765 RTDBucharestRomaniaRO Romania 12->38 40 geoplugin.net 178.237.33.50, 49769, 80 ATOM86-ASATOM86NL Netherlands 12->40 26 C:\Users\user\AppData\...\Hovedrevisorat.bat, PE32 12->26 dropped 28 C:\ProgramData\remcos\logs.dat, data 12->28 dropped 64 Detected Remcos RAT 12->64 66 Tries to detect Any.run 12->66 68 Maps a DLL or memory area into another process 12->68 70 Installs a global keyboard hook 12->70 17 2T10XBqS6g.exe 1 12->17         started        20 2T10XBqS6g.exe 1 12->20         started        22 2T10XBqS6g.exe 2 12->22         started        file9 signatures10 process11 signatures12 42 Tries to steal Instant Messenger accounts or passwords 17->42 44 Tries to harvest and steal browser information (history, passwords, etc) 17->44 46 Tries to steal Mail credentials (via file / registry access) 20->46

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.